• Title/Summary/Keyword: Network Configuration Management

Search Result 247, Processing Time 0.028 seconds

Design and Implementation of a Performance Monitoring and Configuration Management Tool for SANtopia (SANtopia를 위한 성능 감시 및 구성 관리 도구의 설계 및 구현)

  • Rim Kee-Wook;Na Yong-Hi;Min Byoung-Joon;Seo Dea-Wha;Shin Bum-Joo
    • Journal of Internet Computing and Services
    • /
    • v.4 no.1
    • /
    • pp.53-65
    • /
    • 2003
  • I/O processing speed of relatively sluggish storage devices incurs overall performance degradation in computer systems. As a solution to improve the situation, SAN(Storage Area Network) has been proposed. In order to utilize a SAN system more effectively, where storage devices are directly connected with a high speed network such as Fibre Channel, a proper management tool is needed. In this paper, we present a design and implementation of a performance monitoring and configuration management tool for the SANtopia system which supports global file sharing in the SAN environment The developed tool is to monitor the performance of the Linux hosts composing the SANtopia system and to manage the configuration of the hosts and storage devices. It also supports GUI(Graphic User Interface) environment using the JAVA programming language.

  • PDF

Estimating Telephone Network Structure and Investment Cost Changes (교환/전송 기술진화에 따른 전화교환망 구조변화-시뮬레이션 모형에 의한 사례 분석-)

  • 송석재;장석권;전용수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1997.10a
    • /
    • pp.138-141
    • /
    • 1997
  • In this study, a simulation model is developed to analyze the effects of routing and scale-economy of transmission facilities on the traffic network topology and investment cost changes in a metropolitan telephone network. Computational experiments showed that the wide deployment of bifurcated routing in a dual-homing configuration reduces significantly the traffic network connectivity and the investment cost. Its enhanced version, when combined with the subscriber network cost model, can be used as a prototype cost proxy model for figuring out the access charges in a multi-operator environment.

  • PDF

Smart Home Network System Using the Broadband Power Line Communication(BPLC) (광대역 전력선 통신을 이용한 스마트 홈 네트워크 구성에 관한 연구)

  • Yang Hyun-Chang;Sim Kwee-Bo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.87-90
    • /
    • 2005
  • The Intelligent Home provides convenient and comfortable living environment by performing automatic control, heating and air-conditioning, ventilation, home appliances control, home robot control, energy management, visitor management security management, internet, heath state monitoring, etc. through wired/ wireless network and device in the household. Along with the presentation of the features of economical broadband power line communication in the network configuration for new and old houses, its improvement method is proposed.

  • PDF

Context-Driven Framework for High Level Configuration of Virtual Businesses (가상기업의 형성을 위한 컨텍스트 기반 프레임워크)

  • Lee, Kyung-Huy;Oh, Sang-Bong
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.2
    • /
    • pp.11-26
    • /
    • 2007
  • In this paper we suggest a context-driven configuration model of virtual businesses to form a business network model consisting of role-based, interaction-centered business partners. The model makes use of the subcontext concept which explicitly represents actors and interactions in virtual business (VB) context. We separate actors who have capacities on tasks in a specific kind of role and actor subcontext which models requirements in specific interaction subcontext. Three kinds of actors are defined in virtual service chains, service user, service provider, and external service supporter. Interaction subcontext models a service exchange process between two actor subcontexts with consideration of context dependencies like task and quality dependencies. Each subcontext may be modeled in the form of a situation network which consists of a finite set of situation nodes and transitions. A specific situation is given in a corresponding context network of actors and interactions. It is illustrated with a simple example.

  • PDF

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

Design and Implementation of Network Self-Configuration Based on Bluetooth (Bluetooth 기반 네트워크 자동형성 설계 및 구현)

  • Kang, Seong-Ho;Choo, Young-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.10
    • /
    • pp.1376-1384
    • /
    • 2008
  • Numerous researches on network self-configuration have been conducted on Wireless Sensor Network (WSN) and Ad Hoc network but the results have not been applied yet for factory automation. This paper presents development of intelligent process management systems conducting process monitoring and control irrelevant to physical position of a plant operator. The systems are indispensable for diagnosis of rotating machines which cannot exploit wired network. The system was implemented in a Personal Digital Assistant (PDA) using Bluetooth communication protocol. When a mobile terminal reaches to communication range of the process management server, the server detects the mobile terminal to reconfigure plant network automatically. The server authenticates a user of the terminal to download and installs monitoring and control program considering authorized level of the user. If the terminal leaves communication range of the server, it deletes the node from the network and removes the program automatically to save resources and prevent security problems such as missing terminal. Operation of developed functions was verified in a testbed emulating steel-making plant.

  • PDF

Dispersion Management and Optical Phase Conjugation in Optical Transmission Links with a Randomly Distributed Single-Mode Fiber Length

  • Lee, Seong-Real
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.1
    • /
    • pp.1-6
    • /
    • 2013
  • Suppressing or mitigating signal distortion due to group velocity dispersion and optical Kerr effects is necessary in ultra-high speed and long-haul wavelength division multiplexing (WDM) transmission systems. Dispersion management (DM), optical phase conjugation (OPC), and the combination of these two are promising techniques to compensate for signal distortion. In this paper, to implement a flexible optical WDM network, a new optical link configuration with a randomly distributed single-mode fiber (SMF) length and fixed residual dispersion per span in the combination of DM and OPC is proposed and investigated. The simulation results show that the best net residual dispersion (NRD) in the proposed optical links is +10 ps/nm, which is independent of pre- and postcompensation. The effective launch power of the WDM channel is increased more in the optical links with NRD = +10 ps/nm controlled by only precompensation. Furthermore, the system performance difference between the proposed optical link configuration with the best NRD and the conventional optical link with uniform distribution of the SMF length had little significance. Consequently, it is confirmed that the proposed optical link configuration with the best NRD is effective and useful for implementing a reconfigurable long-haul WDM network.

Implementation of a Network Provisioning System with User-driven and Trusty Protection Management

  • Lim, H.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.11
    • /
    • pp.4720-4738
    • /
    • 2015
  • Proper management on user-driven virtual circuits (VCs) is essential for seamless operation of virtual networks. The Network Provisioning System (NPS) is useful software for creating user-driven VCs automatically and must take fault management into account for physical layer impairments on user-driven VCs. This paper addresses a user-driven and trusty protection management in an NPS with an open standard Network Service Interface (NSI), as a contribution to show how to implement the user-driven and trusty protection management required for user-driven VCs. In particular, it provides a RESTful web service Interface for Configuration and Event management (RICE) that enable management of a distinguished data and control plane VC status between Network Service Agents (NSAs) in the event of a node or link fault and repair in a domain. This capability represents a contribution to show how network and protection events in a domain can be monitored between NSAs (NPSs with the NSI) in multiple domains. The implemented NPS controls and manages both the primary and backup VC with disjoint path in a user-driven manner. A demonstration to verify RICE API's capability is addressed for the trusty protection in the dynamic VC network.

Design of an integrated network management system for telecom subsystem in offshore plants

  • Kang, Nam-seon;Kim, Nam-hun;Lee, Seon-ho;Kim, Young-goon;Yoon, Hyeon-kyu
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.8
    • /
    • pp.863-869
    • /
    • 2015
  • This study analyzed the offshore plant industry and related regulations such as ISO, IEC, and Norsok Standards to develop an integrated network management system (INMS) capable of both on-site and remote management and configuration of IP-based network equipment in offshore plants. The INMS was designed based on actual specifications and POS plans, and a plan of management was verified through an offshore plant engineering company. Various modules such as PAGA interface modules, CCTV, IP-PBX, and HF-radio communication modules were developed for system implementation. Protocol and data design and screen design were followed by framework development and introduction of the automatic satellite communication function.

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF