• Title/Summary/Keyword: network management architecture

Search Result 755, Processing Time 0.03 seconds

An Investigation on Security Management Architecture of Home Gateway (홈 게이트웨이 보안 관리 방식에 관한 연구)

  • Kim, Hyun Cheol;An, Seong Jin;Jung, Jin Wook;Kim, Seung Hae;Ryu, Yoon Sik;Jun, Young Il
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.67-74
    • /
    • 2003
  • Home network technologies which interconnect various wire and wireless home appliances, access network technologies and service offer technologies are continuing growth. To provide secure services in the home, home network environment, access network environment, and various service and contents offer technologies are consist organically. Thesis of administration method of systematic and effective groove network is most urgent and important urea to offer safety and authoritativeness of home networking service in home network that strong certification and security function are required among these technologies. In this paper, we propose home gateway security management architecture and the way to use SNMPv3. Also, we propose structure and function of home network management system to support various home networking security scenarios.

  • PDF

A Design of Architecture for Federating between NRNs and Determination Optimal Path

  • Park, Jinhyung;Cho, Hyunhun;Lee, Wonhyuk;Kim, Seunghae;Yun, Byoung-Ju
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.678-690
    • /
    • 2014
  • The current networks do not disclose information about a management domain due to scalability, manageability and commercial reasons. Therefore, it is very hard to calculate an optimal path to the destination. Also, due to poor information sharing, if an error occurs in the intermediate path, it is very difficult to re-search the path and find the best path. Hence, to manage each domain more efficiently, an architecture with top-level path computation node which can obtain information of separate nodes are highly needed This study aims to investigate a federation of a united network around NRN(National Research Network) that could allow resource sharing between countries and also independent resource management for each country. Considering first the aspects that can be accessed from the perspective of a national research network, ICE(Information Control Element) and GFO(Global Federation Organizer)-based architecture is designed as a top-level path computation element to support traffic engineering and applied to the multi-domain network. Then, the federation for the independent management of resources and resource information sharing among national research networks have been examined.

Flow-Based QoS Management Architectures for the Next Generation Network

  • Joung, Jin-Oo;Song, Jong-Tae;Lee, Soon-Seok
    • ETRI Journal
    • /
    • v.30 no.2
    • /
    • pp.238-248
    • /
    • 2008
  • At the extremes of the complexity-performance plane, there are two exemplary QoS management architectures: Integrated Services (IntServ) and Differentiated Services (DiffServ). IntServ performs ideally but is not scalable. DiffServ is simple enough to be adopted in today' core networks, but without any performance guarantee. Many compromise solutions have been proposed. These schemes, called quasi-stateful IntServ or stateful DiffServ, however, have not attracted much attention due to their inherently compromising natures. Two disruptive flow-based architectures have been recently introduced: the flow-aware network (FAN) and the flow-state-aware network (FSA). FAN's control is implicit without any signaling. FSA's control is even more sophisticated than that of IntServ. In this paper, we survey established QoS architectures, review disruptive architectures, discuss their rationales, and points out their disadvantages. A new QoS management architecture, flow-aggregate-based services (FAbS), is then proposed. The FAbS architecture has two novel building blocks: inter-domain flow aggregation and endpoint implicit admission control.

  • PDF

Tuning the Architecture of Neural Networks for Multi-Class Classification (다집단 분류 인공신경망 모형의 아키텍쳐 튜닝)

  • Jeong, Chulwoo;Min, Jae H.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.38 no.1
    • /
    • pp.139-152
    • /
    • 2013
  • The purpose of this study is to claim the validity of tuning the architecture of neural network models for multi-class classification. A neural network model for multi-class classification is basically constructed by building a series of neural network models for binary classification. Building a neural network model, we are required to set the values of parameters such as number of hidden nodes and weight decay parameter in advance, which draws special attention as the performance of the model can be quite different by the values of the parameters. For better performance of the model, it is absolutely necessary to have a prior process of tuning the parameters every time the neural network model is built. Nonetheless, previous studies have not mentioned the necessity of the tuning process or proved its validity. In this study, we claim that we should tune the parameters every time we build the neural network model for multi-class classification. Through empirical analysis using wine data, we show that the performance of the model with the tuned parameters is superior to those of untuned models.

A Study on the Multilevel Electronic Commerce Security using Scalable Multicast (확장 멀티캐스트를 이용한 다중레벨 전자상거래 보안에 관한 연구)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.7 no.1
    • /
    • pp.66-74
    • /
    • 2002
  • Through the increment of requirement for EC(Electronic Commerce) oriented communication services, security multicast communications is becoming more important. However, multicast to EC environment is much different from unicast concept most network security protocols. On the network security, using mandatory access control of multilevel architecture which assigns a specific meaning to each subject, so we accomplish access control. In this way, access control security based on the information security level is proposed. A security protocol based on the architecture proposed in this paper would be utilized in security multicast communications, group key management service and leveled security service through multilevel EC security policy, Also we discuss and propose the security level scaleability and key management method on the network.

  • PDF

Design and Implementation of EMS(Element Management System) based on TMN Architecture (TMN체계의 EMS(Element Management System) 설계 및 구현)

  • 정연기;서승호;김영탁
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.69-79
    • /
    • 1999
  • We have implemented the telecommunication management functions based on TMN (Telecommunications Management Network) architecture that is standardized by ISO/ITU-T. TMN has been developed to manage heterogeneous networks, services and equipment. In this paper, we first analyze the detailed functions of EMS (Element Management System) that performs core functions in the subnetwork management of TMN architecture. We propose an implementation method of EMS for efficient subnetwork management and verify its performance and functionality through detailed implementation and various testing. The proposed EMS consists of EML-Manager module and NML-Agent module. The EML-Manager module controls NEL (Network Element Layer) through the CMIP operations on the managed-objects. The NML-Agent module processes the requests from NMS (Network Management System) in upper layer. We have implemented NMS that performs only the NML-Manager function to test the proposed EMS, and we have used NE-Agent that was designed and implemented by the B-ISDN Lab. of Yeungnam University. The implemented EMS has three management functions: configuration management function, performance management function, and fault management function. We confirmed that the EMS operated normally as we tested the EMS. As further research works, the implementation of NMS with both NML-Manager function and SML-Agent function is required.

  • PDF

Design and Verification of Advanced Distribution Management System using Information and Communication Convergence Technology (ICT융복합 기술을 이용한 차세대 배전계통 운영 시스템 설계 및 검증)

  • Kim, Dongwook;Park, Youngbae;Chu, Cheolmin;Jo, Sungho;Seo, Inyong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.4
    • /
    • pp.19-29
    • /
    • 2019
  • Recently, with the rise of environmental issues and the change of government policy (Renewable Energy 3020 Implementation Plan), a large amount of renewable energy such as solar and wind power is connected to the power system, and most of the renewable energy is concentrated in the power distribution network. This causes many problems with the voltage management and the protection coordination of the grid due to the its intermittent power generation. In order to effectively operate the distribution network, it is necessary to deploy more intelligent terminal devices in the field to measure the status of the distribution network and develop various operation functions such as visualization and big data analysis to support the power distribution system operators. In addition, the failover technology must be supported for the non-stop operation of the power distribution system. This paper proposes the system architecture of new power distribution management system to cope with high penetration of renewable energy. To verify the proposed system architecture, the functional unit test and performance measurement were performed.

Hierarchical Dynamic Spectrum Management for Providing Network-wise Fairness in 5G Cloud RAN (5G Cloud RAN에서 네트워크 공평성 향상을 위한 계층적 적응 스펙트럼 관리 방법)

  • Jo, Ohyun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.1-6
    • /
    • 2020
  • A new resource management algorithm is proposed for 5G networks which have a coordinated network architecture. By sharing the contol information among multiple neighbor cells and managing in centralized structure, the propsed algorithm fully utilizes the benefits of network coordination to increase fairness and throughput at the same time. This optimization of network performance is achieved while operating within a tolerable amount of signaling overhead and computational complexity. Simulation results confirm that the proposed scheme improve the network capacity up to 40% for cell edge users and provide network-wise fairness as much as 23% in terms of the well-knwon Jain's Fainess Index.

A research on the Network Management Architecture for Flexible Automation (Flexible Automation을 위한 네트워크 관리 시스템 구조에 관한 연구)

  • 강문식;이재용;이상배
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.2
    • /
    • pp.202-210
    • /
    • 1994
  • In this paper, the network management system is implemented based on the analysis of reguirements and network operation and management for Flexible Automation. Network management is necessary, which controls and supervises the network resources in the communication network. By means of both analytical methods and queueing model, the delay time distributions due to the increasement of transmission data are obtained and analyzed. The operations of this network management system are certified through the test environments with the network adaptor and softwares for each layer.

  • PDF

Availability Management Methods of RFID Middleware System Based on EPC Network Architecture (EPC Network Architecture에 바탕을 둔 RFID 미들웨어 시스템의 가용성 관리 방안)

  • Ha, Sung-Ho;Park, Jin-Wook;Chae, Heung-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.361-363
    • /
    • 2005
  • EPC Network Architecture는 일반적으로 RFID 미들웨어 시스템의 표준안으로 응용되고 있다. RFID 미들웨어 시스템은 그 사용에 있어 서브시스템들의 장애 발생이 예상되지만 이를 탐지하고 복구하는 가용성(Availability)에 대한 지원은 부족하다. 따라서 본 논문은 EPC Network Architecture를 응용한 미들웨어 시스템을 개발함에 있어 가용성을 보장하는 방안을 제시한다. 그리고 가용성의 특성 가운데 장애 복구 기법에 더욱 초점을 두고 일반적인 수준의 가용성 또는 높은 수준의 가용성을 제공하는 다양한 기법들을 제시한다.

  • PDF