• Title/Summary/Keyword: Manageability

Search Result 64, Processing Time 0.024 seconds

Isolation Schemes of Virtual Network Platform for Cloud Computing

  • Ahn, SungWon;Lee, ShinHyoung;Yoo, SeeHwan;Park, DaeYoung;Kim, Dojung;Yoo, Chuck
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.11
    • /
    • pp.2764-2783
    • /
    • 2012
  • Network virtualization supports future Internet environments and cloud computing. Virtualization can mitigate many hardware restrictions and provide variable network topologies to support variable cloud services. Owing to several advantages such as low cost, high flexibility, and better manageability, virtualization has been widely adopted for use in network virtualization platforms. Among the many issues related to cloud computing, to achieve a suitable cloud service quality we specifically focus on network and performance isolation schemes, which ensure the integrity and QoS of each virtual cloud network. In this study, we suggest a virtual network platform that uses Xen-based virtualization, and implement multiple virtualized networks to provide variable cloud services on a physical network. In addition, we describe the isolation of virtual networks by assigning a different virtualized network ID (VLAN ID) to each network to ensure the integrity of the service contents. We also provide a method for efficiently isolating the performance of each virtual network in terms of network bandwidth. Our performance isolation method supports multiple virtual networks with different levels of service quality.

Strengthening Security on the Internal Cloud Service Certification (국내 클라우드서비스 인증에서 보안 강화방안 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1231-1238
    • /
    • 2013
  • In the background of rapidly increasing domestic cloud service demand, worries about security and privacy incidents can hinder the promotion of cloud service industry. Thus, it is crucial that the independent 3rd party assures the reliability for using the cloud service. This paper compares several external and internal cloud service certification cases, for example CSA certification, FedRAMP certification, KCSA certification, and concludes that insufficient security and privacy controls are prevailing. As a consequence, several enhanced countermeasures by using ISO/IEC 27017, KISA's ISMS considering manageability and expertise are proposed in the cloud service certification system.

A Study on Periodic Buffer Allocation for Program Master Schedule (프로그램 공정계획을 위한 주기적 버퍼 설치에 관한 고찰)

  • Koo Kyo-Jin
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.81-87
    • /
    • 2001
  • In a dynamically changing environment, the manager of a maintenance and remodeling (M/R) program is confronted with an increasing complexity of coordinating and cooperating multi-resource constrained multiple projects. The root causes of the complexity, uncertainty and interdependence, cause an internal disruption of an activity and chain reactions of disturbance propagation that deteriorate the stability and manageability of the program. This paper evaluates previous endeavors to apply production control and management techniques to the construction industry, and investigates the possibility of applying other management concepts and theories to organizational program management. In particular, this paper proposes a buffer allocation model by which periodic buffers are allocated in the flows of program constraint resources to stabilize a program master schedule instead of protecting individual activities. Comparative experiments by Monte Carlo simulations illustrate improved performance of the proposed model in terms of program's goals: productivity, flexibility, and long-term stability.

  • PDF

Physical Topology Discovery for Metro Ethernet Networks

  • Son, Myung-Hee;Joo, Bheom-Soon;Kim, Byung-Chul;Lee, Jae-Yong
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.355-366
    • /
    • 2005
  • Automatic discovery of physical topology plays a crucial role in enhancing the manageability of modern metro Ethernet networks. Despite the importance of the problem, earlier research and commercial network management tools have typically concentrated on either discovering logical topology, or proprietary solutions targeting specific product families. Recent works have demonstrated that network topology can be determined using the standard simple network management protocol (SNMP) management information base (MIB), but these algorithms depend on address forwarding table (AFT) entries and can find only spanning tree paths in an Ethernet mesh network. A previous work by Breibart et al. requires that AFT entries be complete; however, that can be a risky assumption in a realistic Ethernet mesh network. In this paper, we have proposed a new physical topology discovery algorithm which works without complete knowledge of AFT entries. Our algorithm can discover a complete physical topology including inactive interfaces eliminated by the spanning tree protocol in metro Ethernet networks. The effectiveness of the algorithm is demonstrated by implementation.

  • PDF

A Comparative Study on Clothing Behaviors of Elderly Men and Women

  • Kim, Jin-Goo;Lee, Yu-Kyung
    • The International Journal of Costume Culture
    • /
    • v.3 no.2
    • /
    • pp.75-87
    • /
    • 2000
  • The elderly are faced with unique problems in regard to their clothing life, which require solutions from various perspectives. Given these facts, this study was aimed at reviewing and comparing the clothing behaviors of elderly people in order to provide some basic data which apparel businesses targeting the elderly might find useful. The elderly people aged 55 and older and living in Seoul were sampled at random for a survey. The survey used the methods of interview and self-administered questionnaire. 418 questionnaires were distributed to women, and 504 to men. The collected data were processed using SPSS/PC for factor analysis, correlation, single-factor ANOVA and T-test. The results of the survey can be summarized as follows ; 1. Among 8 factors determining the clothing behaviors of elderly people, the importance of clothes and manageability of clothes scored highest on average, while conformity with one's peers scored lowest. 2. The clothing behaviors of elderly people differed significantly depending on their demographic variables. 3. The level of satisfaction with one's life and appearance differed significantly depending on their demographic variables. 4. Clothing behaviors of elderly people were closely correlated with their level of satisfaction with their life and appearance.

  • PDF

Rigorous System Testing by Supporting Vertical Traceability (수직 추적가능성을 제공하는 엄격한 시스템 테스트)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.14D no.7
    • /
    • pp.753-762
    • /
    • 2007
  • Traceability has been held as an important factor in testing activities as well as model driven development. Vertical traceability affords us opportunities to improve manageability from models and test cases to code in testing and debugging phase. Traceability also makes overcome to difficulties of going up-and-down abstraction level to find out error spot of faults discovered by testing This paper represents a vertical test method which connects a system test level and an integration test level in a test stage by using UML. Experiment of how traceability works and how effective focus on error spots has been included using concrete examples of tracing from models to the code.

Traceability of UML Based Test Artifacts Using XML (XML을 이용한 UML 기반 시험 산출물의 추적)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.213-222
    • /
    • 2009
  • Traceability has been held as an important factor in testing activities as well as model driven development. Vertical traceability affords us opportunities to improve manageability from models and test cases to code in testing and debugging phase. Traceability also overcomes difficulties by the separation between abstraction levels when we trace errors from models to source code after test. To support a rigorous test this paper proposes XML based traceability which vertically trace from model and test case to source code. This paper explains how the traceability works and finds out error spots Through experiments using a concrete example.

Critical Success Factors for Efficient Development of Construction Automation Technology (효율적인 건설자동화 기술 개발을 위한 핵심성공요인)

  • Lee, Ung-Kyun;Kim, Baek-Joong;Kim, Taehoon
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.21 no.6
    • /
    • pp.1-6
    • /
    • 2019
  • Construction automation can be an effective alternative for the lack of skilled labor and loss of productivity. With such a background, Korean government has provided a lot of financial supports for the development of construction automation technology. However, despite of those efforts, automation systems at construction sites have rarely been employed. This is because the systems have not been developed with full consideration of the needs and environments on construction sites. Thus, the purpose of this study is to identify the critical success factors for efficient development of construction automation systems. This study compares and analyzes key factors for automated construction system(ACS) and construction information system(CIS). As a result, 'stability and reliability' in the ACS showed the highest importance while 'manageability' in the CIS was. Consequently, for the successful introduction of the ACS, technical capability and stability should be firstly considered to cope with dynamic construction environment, while the CIS should be built to enable efficient management and use of information. The result of this study can serve as an evaluation base for the current construction automation technologies and an index for more efficient technology development in the future as well.

Controlled Bandwidth Borrowing with Extended RSVP-TE to Maximize Bandwidth Utilization

  • Kim Chul;Kim Young-Tak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.64-72
    • /
    • 2004
  • Multiprotocol Label Switching (MPLS) has been developed as a key technology to enhance the reliability, manageability and overall quality of service of core If networks with connection-oriented tunnel LSP and traffic engineering such as constraint-based routing, explicit routing, and restoration. In this paper, we propose a control bandwidth borrowing scheme that maximizes the utilization of tunnel LSPs or physical links by an extension to the RSVP-TE label distribution protocol. MPLS-based core switching network and VPN services rely on the establishment of connection-oriented tunneled LSPs that are configured or predefined by network management systems. The mechanism of network management system varies from (i) a relatively static LSP establishment accounting, to (ii) a dynamic QoS routing mechanisms. With the use of hierarchical LSPs, the extra bandwidth that is unused by the trunk (outer) LSPs should be fully allocated to their constituent end-to-end user traffic (inner) LSPs in order to maximize their utilization. In order to find out the unused extra bandwidth in tunnel LSP or physical link and redistribute these resources to constituent LSPs, we expend the functionality of RSVP-TE and the found unused extra bandwidth is redistributed with a weight-based recursive redistribution scheme. By the extended RSVP-TE and proposed recursive redistributed scheme, we could achieve the instantaneous maximized utilization of tunnel LSP or physical link suffering from the potential under-utilization problem and guarantee the end-to-end QoS requirements. With the proposed scheme, network manager can manage more effectively the extra available bandwidth of hierarchical LSPs and maximize the instantaneous utilization of the tunneled LSP resources.

Study of Information Security Management Model in Public Institution (공공기관의 정보보안 관리 모델 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.43-50
    • /
    • 2013
  • Recently, Cyber threats that is doing intelligence and sophistication from the organization's information assets to secure order technical disciplines, as well as managerial and environmental sectors, such as mind-response system is must established. In this paper, possible to analyze the case for the theory in network security, such as the logical network and physical network separation suitable for the corporate environment and constantly respond and manage the Information Security Management Model A secure network design is proposed. In particular, the proposed model improvements derived from the existing network, network improvements have been made in order to design improved ability to respond to real-time security and central manageability, security threats, pre-emptive detection and proactive coping, critical equipment in the event of a dual hwalreu through applied features such as high-availability, high-performance, high-reliability, ensuring separation of individual network security policy integrated management of individual network, network security directional.