• 제목/요약/키워드: policy based networks

검색결과 452건 처리시간 0.027초

XML기반 PIB를 이용한 네트워크 관리구조 (A Network Management Architecture Using XML-based PIB)

  • 윤권섭;홍충선
    • 한국통신학회논문지
    • /
    • 제28권5B호
    • /
    • pp.414-426
    • /
    • 2003
  • 정책기반 네트워크 관리 구조는 정책을 전송하기 위해 COPS(Common Open Policy Service)와 이의 모델인 COPS-PR (Policy Provisioning)을 사용한다. COPS-PR은 여러 네트워크 관리 영역에서 효율적으로 활용될 수 있는 매커니즘을 가지고 있다. COPS-PR은 정책을 저장하고 디바이스정보를 저장하기 위해 PIB(Policy Information Base)를 사용한다. PIB는 PRC(Provising Class)와 PRI(Provisions Instances)로 구성되어 있다. PIB는 정책을 통해 디바이스를 제어하기 위한 기능이 미리 구현되어 있다. PIB에 PRI를 추가시킴으로써 정책을 수행시킬 수 있다. 하지만 미리 구현되어 있는 기능에 한정되어 사용하기 때문에 새로운 기능에 대해선 정책을 적용할 수 없는 단점을 가지고 있다. 본 논문에서 제안하는 구조는 기존 PIB에 단점을 보완하기 위해 XML로 변환된 PIB를 사용한다. XML 기반 PIB는 동적으로 새로운 기능의 추가가 가능하며, 정책을 통해 이를 수행시킬 수 있는 구조이다. 또한 본 구조에서는 정책 기술 시에도 XML을 이용하였다. 정책 기술시 XML을 이용하면 서로 다른 정책기술 언어를 사용하는 이 기종의 관리 시스템간에 정책 교환 시 XSLT(eXtensible Stylesheet Language Transformation)을 이용하여 쉽게 변환될 수 있다. 본 논문에서는 동적 확장을 고려한 XML기반 네트워크 관리 구조를 제안하고, 이를 구현하여 기존 시스템과의 차별성을 평가하였다.

SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석 (Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network)

  • 주광로;이형호;노봉남
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.573-584
    • /
    • 2001
  • 정책기반 통신망관리 시스템은 다양한 사용자의 요구에 부응하고 대형화, 분산화되는 통신망의 효과적인 관리에 적합한 아키텍처이다. 이 시스템에서의 통신망 관리자는 각 통신망 구성요소에 대한 직접적인 동작설정 대신 미리 설정한 규칙에 따라 통신망 구성요소나 서비스의 동작을 결정하게 된다. 한편, 융통성있는 통신망 관리 프레임워크를 제시한 SNMPv3는 인증, 암호화, 접근통제 등의 보안서비스를 제공함으로써, 이전 SNMP 버전들이 제공하지 못했던 안전한 통신망 관리를 위한 기반기술을 제공하고 있다. 그러나, SNMPv3의 개선된 보안서비스에도 불구하고 통신망 관리자별로 인증과 암호화 과정에 이용되는 보안정보가 관리되고, 보안정보가 통신망 구성요소에 분산되어 있어 중앙집중방식의 체계적인 보안관리기능이 제공되지 않아 여러 관리자에 의해 운영되는 대규모 통신망을 효과적으로 관리하는데 부적합한 문제점을 가지고 있다. 본 논문에서는 중앙집중방식의 규모확장성과 통신망 보안관리기능을 제공하기 위해 보안관리정책을 지원하는 역할기반 보안관리 모델을 제시하고, 이를 추가한 SNMPv3의 확장된 보안시스템의 구조, 동작절차 및 보안관리 관점에서의 효율성 분석에 대해 기술한다.

  • PDF

프로그래머블 네트워크 기술을 이용한 네트워크 보안 관리 구조 제안 (Proposal of Network Security Management architecture using Programmable Network Technology)

  • 김명은;오승희;김광식;남택용;손승원
    • 한국통신학회논문지
    • /
    • 제28권10C호
    • /
    • pp.1033-1044
    • /
    • 2003
  • 본 논문에서는 이기종의 보안 장비를 보다 효율적으로 관리할 수 있는 보안 관리 구조와 관리 트래픽의 부하를 줄일 수 있는 프로그래머블 미들웨어를 제안하였다. 제안된 보안 관리 구조는 정책 기반 네트워크 관리 (Policy Based Network Management: PBNM) 구조에 프로그래머블 네트워크 기법을 접목한 것으로, 다양한 이기종의 보안 장비를 보안 정책을 통해 관리할 수 있으며, 보안 장비 간 연동을 제공한다. 또한, 미들웨어에서 보안 정책을 실행 가능한 형태로 변환해 줌으로써 관리상의 편이성을 제공하고 정책 서버의 부하를 줄일 수 있다. 본 논문에서는 제안된 구조와 PBNM 구조에서의 정책적용 및 변환시간과 메시지 전달시간을 비교함으로써 프로그래머블 미들웨어가 관리 트래픽의 부하를 줄일 수 있다는 것을 검증하였다.

Seamless Mobility of Heterogeneous Networks Based on Markov Decision Process

  • Preethi, G.A.;Chandrasekar, C.
    • Journal of Information Processing Systems
    • /
    • 제11권4호
    • /
    • pp.616-629
    • /
    • 2015
  • A mobile terminal will expect a number of handoffs within its call duration. In the event of a mobile call, when a mobile node moves from one cell to another, it should connect to another access point within its range. In case there is a lack of support of its own network, it must changeover to another base station. In the event of moving on to another network, quality of service parameters need to be considered. In our study we have used the Markov decision process approach for a seamless handoff as it gives the optimum results for selecting a network when compared to other multiple attribute decision making processes. We have used the network cost function for selecting the network for handoff and the connection reward function, which is based on the values of the quality of service parameters. We have also examined the constant bit rate and transmission control protocol packet delivery ratio. We used the policy iteration algorithm for determining the optimal policy. Our enhanced handoff algorithm outperforms other previous multiple attribute decision making methods.

The Objectives and Governance of Science and Technology Diplomacy: A Preliminary Comparative Analysis

  • Lee, Chansong
    • STI Policy Review
    • /
    • 제6권1호
    • /
    • pp.85-110
    • /
    • 2015
  • Science and technology diplomacy has become an important policy agenda because of its diplomatic utility and enhancing of international science networks. However, different countries possess different objectives and governance of S&T diplomacy. In this context, this paper seeks to answer the following questions: what are the similarities and differences of S&T diplomacy in countries and what shapes these characteristics? To answer these questions, this paper conducts a comparative case study with five countries - Switzerland, Germany, Japan, the United Kingdom, and the United States - whose S&T diplomatic programs are highly recognized and benchmarked by other countries. A useful typology is devised to conduct a systematic comparison. For S&T diplomatic objectives, this paper suggests five types by elaborating concepts from the previous literature: access diplomacy, promotion diplomacy, public aid diplomacy, functional diplomacy, and global leadership diplomacy. Also, in terms of a governance model for S&T diplomacy, three models - a sciencecentered model, a science-outsourcing model and a top-down coordinating model - are suggested based on leadership organization. This paper reveals the different characteristics of the selected countries in S&T diplomacy. While the selected countries pursue almost every type of S&T diplomatic objective, the US and the UK tend to conduct influence-based diplomacy more than other countries do. In addition, different countries each have unique governance models for S&T diplomacy. While more research is necessary for vigorously testing the causes of different objectives and their relationship with governance models, this paper suggests more general policy implications throughout. The strength of the country's S&T base is fundamentally important for the success of S&T diplomacy. However, domestic S&T assets need to be transferred to its diplomatic capabilities. In this sense, the appropriate governance that fits best with the country's S&T mission should be established, while S&T communities should increasingly play a leadership role in evolving global S&T networks.

이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발 (A Development of Central Policy Database for managing Heterogeneous Firewall Systems)

  • 이동영;정태명
    • 정보처리학회논문지D
    • /
    • 제9D권6호
    • /
    • pp.1063-1070
    • /
    • 2002
  • 정보통신과 컴퓨터기술의 발전으로 인하여 불법침입으로 인한 정보 파괴, 서비스거부공격 그리고 컴퓨터 바이러스 등에 의한 역기능이 날로 증가하고 있는 추세이다. 또한, 이러한 공격들로부터 네트워크를 보호하기 위해서 침입차단 시스템, 침입탐지 시스템, 접근제어 시스템 등 많은 보안제품들이 개발 및 적용되고 있다. 그러나 이러한 보안 제품들에 대한 관리를 위해서는 많은 작업과 비용이 소요된다. 따라서, 이들 보안제품들에 대한 효율적인 관리와 일관된 보안정책을 적용할 수 있는 정책 기반의 통합보안관리 시스템의 정책모델이 필요하게 되었다 본 논문에서는 중앙 정책 데이터베이스를 기반으로 대표적인 보안 시스템인 침입차단 시스템을 통합 관리하는 시스템의 구조와 세부 기능들에 대해서 기술하였다. 그리고, 중앙 정책 데이터베이스를 통해 네트워크 상의 각 방화벽 정책을 조정하고 유지하는 네트워크 방화벽 통합 관리 시스템의 핵심부분인 WISMSF 엔진의 구현 기술과 정책 충돌을 정의하고 정책 복구 과정을 제시하였다.

기능적 상호작용에 따른 도시권 설정과 성장관계에 대한 연구 (Study on the Delineation of City-Regions Based on Functional Interdependence and Its Relationships with Urban Growth)

  • 김도형;우명제
    • 국토계획
    • /
    • 제54권7호
    • /
    • pp.5-23
    • /
    • 2019
  • The central government has implemented policies to strengthen the competitiveness of small and medium sized cities for balanced development at the national scale. However, since it is often difficult to enhance the competitiveness through partial projects of each jurisdiction, many local governments collaborate at the regional scale. This suggests that a regional approach is important for the management of small and medium sized cities. On the one hand, the concept of network city suggests that various functional networks can affect the growth of small and medium sized cities. Given this background, the purposes of this study are to delineate regional boundaries at national scale and identify their relations of growth by using functional network and Moran's I index. The study uses the Markov-chain model and cluster analysis to delineate the regions, and Moran's I is employed to identify the relations of growth. The results show that interactions between jurisdictions through networks could be crucial factors for growth of small and medium sized cities, while the networks based on passenger travel and freight movement have different implications. The results suggest that policy makers should not only consider local level investments, but also take the characteristics of networks between cities into account for achieving balanced development and developing regeneration policies.

Throughput Maximization for a Primary User with Cognitive Radio and Energy Harvesting Functions

  • Nguyen, Thanh-Tung;Koo, Insoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3075-3093
    • /
    • 2014
  • In this paper, we consider an advanced wireless user, called primary-secondary user (PSU) who is capable of harvesting renewable energy and connecting to both the primary network and cognitive radio networks simultaneously. Recently, energy harvesting has received a great deal of attention from the research community and is a promising approach for maintaining long lifetime of users. On the other hand, the cognitive radio function allows the wireless user to access other primary networks in an opportunistic manner as secondary users in order to receive more throughput in the current time slot. Subsequently, in the paper we propose the channel access policy for a PSU with consideration of the energy harvesting, based on a Partially Observable Markov decision process (POMDP) in which the optimal action from the action set will be selected to maximize expected long-term throughput. The simulation results show that the proposed POMDP-based channel access scheme improves the throughput of PSU, but it requires more computations to make an action decision regarding channel access.

Object detection in financial reporting documents for subsequent recognition

  • Sokerin, Petr;Volkova, Alla;Kushnarev, Kirill
    • International journal of advanced smart convergence
    • /
    • 제10권1호
    • /
    • pp.1-11
    • /
    • 2021
  • Document page segmentation is an important step in building a quality optical character recognition module. The study examined already existing work on the topic of page segmentation and focused on the development of a segmentation model that has greater functional significance for application in an organization, as well as broad capabilities for managing the quality of the model. The main problems of document segmentation were highlighted, which include a complex background of intersecting objects. As classes for detection, not only classic text, table and figure were selected, but also additional types, such as signature, logo and table without borders (or with partially missing borders). This made it possible to pose a non-trivial task of detecting non-standard document elements. The authors compared existing neural network architectures for object detection based on published research data. The most suitable architecture was RetinaNet. To ensure the possibility of quality control of the model, a method based on neural network modeling using the RetinaNet architecture is proposed. During the study, several models were built, the quality of which was assessed on the test sample using the Mean average Precision metric. The best result among the constructed algorithms was shown by a model that includes four neural networks: the focus of the first neural network on detecting tables and tables without borders, the second - seals and signatures, the third - pictures and logos, and the fourth - text. As a result of the analysis, it was revealed that the approach based on four neural networks showed the best results in accordance with the objectives of the study on the test sample in the context of most classes of detection. The method proposed in the article can be used to recognize other objects. A promising direction in which the analysis can be continued is the segmentation of tables; the areas of the table that differ in function will act as classes: heading, cell with a name, cell with data, empty cell.

Network Analysis on Communication of Welfare Policy Using Twitter Data

  • Seo, Bojun;Lee, Soochang
    • International Journal of Advanced Culture Technology
    • /
    • 제6권2호
    • /
    • pp.58-64
    • /
    • 2018
  • This main purpose of the study is to identify social network of communicators sharing information on Bokjiro for publicizing welfare policy. This study employs NodeXL pro to understand networks and their role in the social network. The data for social network analysis was collected from Twitter for a week. The result of the analysis shows that the social network of communicators on Bokjiro does not have many nodes. It also has an independent network with high possibility of information distortion. Little communicators have controlling power in information flow in one way of communication. According to the result, it is not effective for marketing strategy of welfare policy in providing online information through Bokjiro. The study suggests that the government should use the transactional approach to marketing based on agent-oriented activity focusing on the exchange relationship between information providers and demanders in an age of networked intelligence.