• Title/Summary/Keyword: access management

Search Result 3,316, Processing Time 0.028 seconds

AICPS Management Network Integration (PC 통신 서비스 상호 접속 시스템(AICPS)의 통합 관리망)

  • Hong, Yong-Pio;Yun, Sung-Je;Lee, Jin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.10 no.1
    • /
    • pp.11-21
    • /
    • 1999
  • Physically, AICPS consists of HSSF(High Speed Switching Fabric) and various types of service interface modules to support services of homogeneous communication networks. Functionally, AICPS consists of UANS(User Access Network Subsystem) to connect users with communication networks, IDNS(Information Delivery Network Subsystem) to connect Information-Providers with information delivery network, and LOMS(Local Operations and Management System to manage AICPS. This paper describes the structures of LOMS, ONAS(Operational Network Access Subsystem), which interfaces between LOMS and HSSF, and describes reliability improvement algorithms and construction methods of nationwide management structure of AICPS.

  • PDF

A Study on the Electronic Records Management for Enhancing Public Access (공개활성화를 위한 전자기록물 관리정책 연구)

  • 설문원
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.1
    • /
    • pp.65-86
    • /
    • 2001
  • This study aims to analyze the current policies and problems associated with the electronic records disclosure and to suggest the access paradigm for electronic records management. For this, Act on Disclosure of Information by Public Agencies. Public Records Management Act, and Electronic Government Act are analyzed in the light of public access to electronic records. The analysis lays special emphasis on the scope of public records to be disclosed, time to disclosure of public records. computer editing for pubic service. records dissemination through Internet, and the role of records centers and public libraries. Based upon the analysis, policy directions for electronic records management are suggested.

  • PDF

Design and Implementation of Mobile RFID Middleware based Pet Management System (모바일 RFID 미들웨어 기반 Pet 관리시스템의 설계 및 구현)

  • Park, Byoung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.19-26
    • /
    • 2010
  • The most critical element in the real-time operation of RFID application programs that are suitable for the mobile environment is the RFID middleware, made exclusively for mobile handsets, which processes collected data on a real-time basis and sends only the useful information to the application client. In this paper, we intend to design and implement the Pet management system for optimized mobile RFID middleware that supports real-time data processing. The proposed Pet management system consists of registration module, retrieval module, communication module, and display module in order to display retrieval result from server. Also, the captured data in the PDA is transmitted to the server and another client system using the mobile application interface that supports the SOAP application access protocol.

Adaptive Convergence Security Policy and Management Technology of Home Network (홈 네트워크에서의 적응적 통합 보안 정책 및 관리 기술)

  • Lee, Sang-Joon;Kim, Yi-Kang;Ryu, Seung-Wan;Park, You-Jin;Cho, Choong-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.72-81
    • /
    • 2011
  • In this paper, we propose adaptive convergence security policies and management technologies to improve security assurance in the home networking environment. Many security issues may arise in the home networking environment. Examples of such security issues include the user privacy, the service security, the integrated networking security, the middleware security and the device failure. All these security issues, however, should be fulfilled in phase due to many difficulties including deployment cost and technical complexity. For instance, fundamental security requirements such as authentication, access control and prevention of crime and disaster should be addressed first. Then, supplementary security policies and diverse security management technologies should be fulfilled. In this paper, we classify these requirements into three categories, a service authentication, a user authentication and a device authentication, and propose security policies and management technologies for each requirement. Since the home gateway is responsible for interconnection of many home devices and external network access, a variety of context information could be collected from such devices.

A Study on the Operational Policies and Best Practice of Repository (성공적인 리포지터리의 운영정책에 관한 연구)

  • Jung, Young-Mi;Lee, Sang-Gi
    • Journal of the Korean Society for information Management
    • /
    • v.27 no.4
    • /
    • pp.131-152
    • /
    • 2010
  • This study investigated and analyzed operating policies and status of the best practices repository in the world to propose the successful strategies of management and establishment of repository. The best practices were selected from the top 10 of the Ranking Web of World Repositories by CSIC and Registry of Open Access Repositories by JISC. These repositories fell into two rough classes, disciplinary and institutional repositories. Policies on operation and support, collection, management, distribution and information services, long-term preservation, technology and copyright were analyzed. Characteristic of disciplinary and institutional repository policies were also identified.

Frequency Reassignment Problem in Code Division Multiple Access Networks

  • Han Jung-Hee
    • Management Science and Financial Engineering
    • /
    • v.12 no.1
    • /
    • pp.127-142
    • /
    • 2006
  • In this paper, we present a frequency reassignment problem (FRP) that arises when we add new base stations to resolve hot-spots or to expand the coverage of a code division multiple access (CDMA) network. For this problem, we develop an integer programming (IP) model along with some valid inequalities and preprocessing rules. Also, we develop an effective heuristic procedure that solves two sub-problems induced from the original problem in repetition. Computational results show that the proposed heuristic procedure finds a feasible solution of good quality within reasonable computation time. Also, the lower bound by-produced from the heuristic procedure is quite strong.

무선인터넷망 개방이 무선인터넷 시장에 미칠 영향 -소비자 후생과 컨텐츠공급자 수익을 중심으로-

  • 박은영;이호무;안병훈
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.222-225
    • /
    • 2001
  • Policy introducing open access to the wireless network has been under discussion in the Korean mobile telecommunications industry. The policy, which directs mobile operators to allow mobile portals other than their own ones to access their network and subscribers, is expected to vitalize mobile Internet market through competition among portals. This study analyzes the impact of the policy in terms of welfare of mobile Internet users and profit of mobile contents providers. We also cover the influence of mobile Internet fee on anticipated results of the policy

  • PDF

Performance Evaluation of a Bandwidth Allocation Algorithm of E-PON (가입자 통신망을 위한 대역 할당 알고리즘 성능 분석)

  • Ju, Un-Gi;Lee, Sang-U;Kim, Chan;Gwon, Yul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.361-364
    • /
    • 2005
  • As increasing the Internet traffic, many researches on access network are reported for end-to-end high-speed broadband network, where E-PON(Ethernet-Passive Active Network) is one of reasonable candidate fur the network with respect to cost and bandwidth utilization. For the high-speed access network, E-PON need an efficient bandwidth allocation method. This paper suggests a WFA(Water-Filling Allocation) algorithm for the efficient bandwidth allocation with various simulation test.

  • PDF

불확실한 수요와 기술 환경을 고려한 가입자망 진화 의사결정모형

  • 김도훈;안재현;차동완
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.239-244
    • /
    • 1998
  • The environment of the access network service market is characterized by uncertain demand and various competing alternative technologies. In Korea, despite the introduction of competition, dominant Public Network Operator(PNO) still leads the market. Therefore, the decision of PNO has a great impact on the access network evolution. In this paper, we propose an model which aims to reduce risks and both investment and operating costs, to cope with the uncertain demand and technology evolution. We expect this model to provide a tool analyze risks and evaluate various strategies on the network evolution.

  • PDF

The study for improvement of traffic performance based on load balancing in wireless LAN (로드발랜싱기반 무선랜의 트래픽 성능 향상에 관한 연구)

  • Park, Chi-Ho;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.1-6
    • /
    • 2006
  • This paper proposes association algorithm using load balancing for efficient AP selection under environment of wireless local area network(WLAN). Our scheme measures arrival time of association information when establishing the connection between access points and access terminal, analyzes the load condition of AP, and applies load balancing. AT selects and sets up low traffic AP by measuring traffic of connected access terminal, which can prevent over-franc of access points under hotspot environment that users access simultaneously. According to the above-described selection in a high speed wireless Internet service based on public WLAN technologies that are currently in operations. Further, it is possible to improve the efficiency of network management.