• Title/Summary/Keyword: policy server

Search Result 355, Processing Time 0.025 seconds

An Extended SIP-based Network Architecture and Session Management Methods for Internet QoS (QoS를 지원하는 확장 SIP 기반 네트워크 구조 및 세션 제어 방법)

  • Shin Kang-Sik;Lee Jong-Hoon;Hong Kyung-Pyo;Yoo Sang-Jo;Cho Eun-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.1
    • /
    • pp.73-88
    • /
    • 2006
  • With the development of Next Generation convergence Network, the current Internet needs a new network architecture and new session establishment methods, which can support various applications requiring differentiated traffic processing and high quality of service instead of the conventional best-effort service. It is expected that, in next generation network based on All-IP. SIP will play an important role in the session establishment between the end to end user terminals. In this paper, we propose a new network architecture that can provide quality of service based on SIP using the QoS enabled SIP servers and policy servers, and we also propose a new session establishment method that apply the user's demands participating the session establishment when setting up the session using the SIP. Through simulations under various environments, we show the parameter ranges in terms of server capacity and the number of users in access networks to achieve reasonable delay bounds.

  • PDF

Analysis of a Queueing Model with a Two-stage Group-testing Policy (이단계 그룹검사를 갖는 대기행렬모형의 분석)

  • Won Seok Yang
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.45 no.4
    • /
    • pp.53-60
    • /
    • 2022
  • In a group-testing method, instead of testing a sample, for example, blood individually, a batch of samples are pooled and tested simultaneously. If the pooled test is positive (or defective), each sample is tested individually. However, if negative (or good), the test is terminated at one pooled test because all samples in the batch are negative. This paper considers a queueing system with a two-stage group-testing policy. Samples arrive at the system according to a Poisson process. The system has a single server which starts a two-stage group test in a batch whenever the number of samples in the system reaches exactly a predetermined size. In the first stage, samples are pooled and tested simultaneously. If the pooled test is negative, the test is terminated. However, if positive, the samples are divided into two equally sized subgroups and each subgroup is applied to a group test in the second stage, respectively. The server performs pooled tests and individual tests sequentially. The testing time of a sample and a batch follow general distributions, respectively. In this paper, we derive the steady-state probability generating function of the system size at an arbitrary time, applying a bulk queuing model. In addition, we present queuing performance metrics such as the offered load, output rate, allowable input rate, and mean waiting time. In numerical examples with various prevalence rates, we show that the second-stage group-testing system can be more efficient than a one-stage group-testing system or an individual-testing system in terms of the allowable input rates and the waiting time. The two-stage group-testing system considered in this paper is very simple, so it is expected to be applicable in the field of COVID-19.

A Policy Based Management Model of Quality of Service for Differentiated Services Networks (차별화 서비스망을 위한 정책 기반 서비스 품질 관리 모델)

  • Cha, Si-Ho;Kang, Young-Man;Cho, Kuk-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.2
    • /
    • pp.171-178
    • /
    • 2003
  • Differentiated Services (DiffServ) is a technique to provide Quality of Service (QoS) in an efficient and scalable way. However, current DiffServ specifications have limitations in providing the complete QoS management framework and its implementation model. This paper proposes a policy-based QoS management model that supports DiffServ policies for managing QoS of DiffServ networks. The management model conforms to Model-View-Controller (MVC) architecture, and is based on Enterprise JavaBeans (EJBs) technologies. In our model, high-level DiffServ QoS policies are represented as valid XML documents with an XML Schema and are translated to low-level EJB policy beans in the EJB-based policy server. The routing topology and role information required to define QoS policies is discovered by using SNMP MIB-II, and the QoS policy distribution and monitoring is accomplished by using SNMP DiffServ MIB.

Analysis of a Controllable Queueing Model Operating under the Alternating Operating Policies (변동 운용방침이 적용되는 조정가능한 대기모형 분석)

  • Rhee, Hahn-Kyou
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.39 no.1
    • /
    • pp.81-90
    • /
    • 2016
  • Different from general operating policies to be applied for controllable queueing models, two of three well-known simple N, T and D operating policies are applied alternatingly to the single server controllable queueing models, so called alternating (NT), (ND) and (TD) policies. For example, the alternating (ND) operating policy is defined as the busy period is initiated by the simple N operating policy first, then the next busy period is initiated by the simple D operating policy and repeats the same sequence after that continuously. Because of newly designed operating policies, important system characteristic such as the expected busy and idle periods, the expected busy cycle, the expected number of customers in the system and so on should be redefined. That is, the expected busy and idle periods are redefined as the sum of the corresponding expected busy periods and idle periods initiated by both one of the two simple operating policies and the remaining simple operating policy, respectively. The expected number of customers in the system is represented by the weighted or pooled average of both expected number of customers in the system when the predetermined two simple operating policies are applied in sequence repeatedly. In particular, the expected number of customers in the system could be used to derive the expected waiting time in the queue or system by applying the famous Little's formulas. Most of such system characteristics derived would play important roles to construct the total cost functions per unit time for determination of the optimal operating policies by defining appropriate cost elements to operate the desired queueing systems.

P-RBACML : Privacy Enhancing Role-Based Access Control Policy Language Model (P-RBACML : 프라이버시 강화형 역할기반접근통제 정책 언어 모델)

  • Lee, Young-Lok;Park, Jun-Hyung;Noh, Bong-Nam;Park, Hae-Ryong;Chun, Kil-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.149-160
    • /
    • 2008
  • As individual users have to provide more information than the minimum for using information communication service, the invasion of privacy of Individual users is increasing. That is why client/server based personal information security platform technologies are being developed such as P3P, EPAL and XACML. By the way enterprises and organizations using primarily role based access control can not use these technologies. because those technologies apply access control policies to individual subjects. In this paper, we suggest an expression language for privacy enhancing role-based access control policy. Suggested privacy enhancing role-based access control policy language model is a variation of XACML which uses matching method and condition, and separately contains elements of role, purpose, and obligation. We suggest policy language model for permission assignment in this paper, shows not only privacy policy scenario with policy document instance, but also request context and response context for helping understanding.

Implement of XML-Based Authorization Policy Module (XML 기반 권한 정책 모듈 구현)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1762-1767
    • /
    • 2005
  • PKI provides good resolutions for the authentication of user in the situation not to meet each other, but it is not enough to provide the resolution of authorization in distributed computing environments. Especially, we offer a variety forms of the user Authentication, the Integrity and a security service of the Non-Repudiation, but an authorization Policy, because of the complexity with a lot of information, using m understandable XML, makes a simple and easy certificate to read, and we get the information from DOM fee and do a XML analysis and stardardized-method usage easily In this paper, we provide the AAS model being able to use with the solution of the distributed users' authorization, and we implement an authorization policy module, using XML. in the Linux-based Apache Web server.

A Modified LRU Page Replacement Policy with LMF for Web Proxy Cache (LMF로 수정된 웹 프락시 캐쉬용 LRU페이지 교체 정책)

  • 이용임;김주균
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.7_8
    • /
    • pp.426-433
    • /
    • 2003
  • Management policies of Web Proxy Cache, for the QoS of Web users, are mainly focused on the page replacement and the data consistency policy. But the two subjects have been studied independently to each other regardless of its possibility of cooperation. In this paper, we introduce the performance improvement obtained by adapting the characteristic of LMF used in data consistency policy to LRU, thus taking the better performance synergy as a result of complementary cooperation. Various policies for the management of Web Proxy Cache are in progress, this study can be a way of performance guide to increase cache hit ratio and reduce the transmission overhead of Web Server.

A Cache Policy Based on Producer Popularity-Distance in CCN (CCN에서 생성자 인기도 및 거리 기반의 캐시정책)

  • Min, Ji-Hwan;Kwon, Tae-Wook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.791-800
    • /
    • 2022
  • CCN, which has emerged to overcome the limitations of existing network structures, enables efficient networking by changing the IP Address-based network method to the Content-based network method. At this time, the contents are stored on each node(router) rather than on the top server, and considering the limitation of storage capacity, it is very important to determine which contents to store and release through the cache policy, and there are several cache policies that have been studied so far. In this paper, two of the existing cache policies, producer popularity-based and distance-based, were mixed. In addition, the mixing ratio was set differently to experiment, and we proved which experiement was the most efficient one.

Home Monitoring Server System using Smart Interface over Wireless Networks (무선네트워크 통신을 활용한 스마트 연동 홈 모니터링 서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.225-231
    • /
    • 2012
  • In this paper, we implement a wireless home monitoring system using physical computing platform with the open source type for house environment management. Sensors for temperature, optics and ultrasonic waves are used for home environment elements detection and control for the home safety. To obtain information related with home and transmit it to RIA Windows server system, XBee wireless communication system is used and the transmitted information is saved in mySQL database for history management. The possibility of prevention against fire disaster of a house situated in a dense buildings area and highly populated environments is suggested by adopting the proposed system.

Metering scheme for client privacy protection (방문자의 프라이버시를 보호하는 측정 방식)

  • Park, Choon-Sik
    • Journal of Digital Convergence
    • /
    • v.11 no.5
    • /
    • pp.291-298
    • /
    • 2013
  • Metering scheme is composed of servers, clients, and an audit agency who collects the information for the clients which have been processed by servers. Although many efficient and secure metering schemes have been proposed in the literature, they do not consider the client privacy issue. To mitigate this limitation of the related work, we propose a metering scheme to protect the privacy of clients in internet. More specifically, we apply RSA based blind signature to the interaction between client and audit agency. If a client spends metering information to the server more than twice, the identity of the client is revealed by the server or audit agency.