首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Network and business management convergence is seen as the next step towards harmonizing information technology resource allocation with target business goals. This paper proposes a management platform that starts at the specification of business targets in the form of policies and goes all the way to enforcing them in a next generation Quality of Service aware network. We specified both a policy language and a parser and also implemented procedures for mapping policies into underlying network mechanisms. Furthermore, case studies presented in this paper show performance results of network services controlled by such policies.  相似文献   

2.
O'Mahony  D. 《IEEE network》1994,8(3):12-17
Considers the security aspects of communication between two management processes operating in different management domains; identifies two major risks: the security of information exchanged during the management association, and control of access to the management information base (MIB); and enumerates the various threats that must be guarded against and possible methods of attack. Security techniques, including symmetric and public key cryptosystems, are employed in the design of a method of achieving a secure management association. A scheme of authorization control for MIB access is developed. The management of an open system's network resources takes place in the context of a management association. The resources themselves are controlled by an agent process which presents a view of these resources to the outside world as a number of managed objects, each of which contains a number of attributes. The collection of objects presented to the outside world by the agent is known as the MIB. A manager process regulates the operation of the managed resources by engaging in a management association with the agent and instructing it to carry out simple operations on elements of the MIB. Within a single management domain where all processing nodes and network links are under the control of the same administration, security is not such a critical issue. However, when the management association takes place across the boundary between two separate management domains, and make use of public data networks, security issues must be considered in greater detail  相似文献   

3.
《IEEE network》1990,4(4):7-13
Various aspects of integrated network management for business enterprises are discussed. Two categories of communications resources are considered: those that provide interfacility networking, such as circuit-switching or packet-switching telecommunications networks, and those that provide intrafacility networking, such as some form of local area network. The topics covered include: the network management environment within an enterprise; network management elements; the requirements for enterprise network management; a basic architecture for integrated network management; value-added services that expert system modules can provide; current approaches; and possible migration strategies for achieving integrated network management  相似文献   

4.
Technological and human factors have contributed to increase the complexity of the network management problem. Heterogeneity and globalization of network resources, on one hand, have increased user expectations for flexible and easy-to-use environments; on the other hand, they have suggested entirely novel ways to face the management problem. Several research efforts recognize the need for integrated solutions to manage both network resources and services in open, global, and untrusted environments. In addition, these solutions should permit the coexistence of different management models and should interoperate with legacy systems. In the paper, we define a general architecture based on a distributed processing environment (DFE) that offers a large set of facilities to the application level. We have developed the MESIS management environment shaped after the above architecture and its DPE facilities with mobile agents technology. MESIS handles, in a uniform way, both resources and services, and focuses on two crucial properties: interoperability to overcome heterogeneity, and security to grant users safe and protected operations. The Agent Interoperability Facility supports compliance with CORBA-based management systems and with MASIF agent platforms. The Agent Security Facility provides authentication, integrity, privacy, authorization, and secure interoperation with CORBA systems  相似文献   

5.
The domestic satellite industry has grown from the start-up phase to a position of relative maturity under a variety of flexible regulatory policies. This article focuses on two areas of policy which are critical to future growth in the industry. First, the existing policy governing orbital assignments is reviewed and recommendations presented for future policy changes. Second, the article stresses the need for policies to insure that all participants can operate in an environment free of undue frequency interference. The article concludes that the public interest motivation behind these policies is best served by a balance between regulatory oversight and industry self-help.  相似文献   

6.
分析比较了多厂商网络环境下连接管理的三种方式,基于TMN,基于TINA和基于移动代理的方式并提出三种方式进行相互综合和交互的方法。  相似文献   

7.
An active network is a network infrastructure which is programmable on a per-user or even per-packet basis. Increasing the flexibility of such network infrastructures invites new security risks. Coping with these security risks represents the most fundamental contribution of active network research. The security concerns can be divided into those which affect the network as a whole and those which affect individual elements. It is clear that the element problems must be solved first, since the integrity of network-level solutions will be based on trust in the network elements. In this article we describe the architecture and implementation of a secure active network environment (SANE), which we believe provides a basis for implementing secure network-level solutions. We guarantee that a node begins operation in a trusted state with the AEGIS secure bootstrap architecture. We guarantee that the system remains in a trusted state by applying dynamic integrity checks in the network element's runtime system, using a novel naming system, and applying node-to-node authentication when needed. The construction of an extended LAN is discussed  相似文献   

8.
The ACC Systems Manager of Network Activity (MONA) represents a return to simplicity in the management and control of IP-based multivendor internetworks. What follows is a look at the inner workings of the product and philosophies that shaped it.  相似文献   

9.
计算机技术的普及使得人类开始进入到大数据时代,越来越多的资料通过网络进行存储,并采用计算机进行归档和管理,提升了办公整体效率,提升了办公数据的处理质量。但是大数据环境下网络信息的归档还是存在一些问题,在数据的保管和归档方法方面存在一些不足,因此需要对网络信息归档和管理进行更加全面的研究。文章主要针对大数据环境下网络信息归档与管理现状与对策进行研究。  相似文献   

10.
随着网络的快速发展,越来越多的人们通过网络发表个人观点及看法,网络舆情成为社会舆情中的重点对象和主要方式.本文通过对大数据环境下网络舆情及其特点的阐述、分析,结合数据挖掘、文本情感分析等技术,初步构建出了网络舆情管理系统的模型.  相似文献   

11.
In this sixth (and final) article in the series on Token Ring Network Management we will discuss Performance Management, which is relevant for many parts of the distributed Token Ring environment  相似文献   

12.
Following the tutorial ‘Token Ring Network Management’ article in the previous issue of the International Journal of Network Management, this article takes us through some more detailed Problem Management scenarios.  相似文献   

13.
This article, which is the fifth in the series on Token Ring Network Management, will discuss selected aspects of Change Management that are relevant in today's Token Ring networking environment.  相似文献   

14.
In this fourth article in the series on Token Ring Network Management we will discuss selected areas of relevance to today's Token Ring networking environment.  相似文献   

15.
Nowadays, with the development of industrialization and urbanization, air pollution has been a serious problem all of the word. Air pollutant is harmful to human and ecological environment, for example, SO2 and NO2 produced by industry are vital to living organisms, greenhouse air such as CO2 causes global warming. As a result, environmental monitoring is of great importance for human beings.This paper proposes a scheme to implement environmental monitoring. In particular, wireless sensor network collect data from surrounding environment and mobile communication system receive and process these data. To avoid network congestion, a cognitive protocol is proposed for wireless sensors accessing to mobile network. Besides that, a dynamic working scheme is also proposed for sensors so that data collection rate can be adapted to the situation of network.  相似文献   

16.
This paper discusses a control network organization for industrial battery management. The battery network is logically partitioned into strings containing groups of cells. These groups of cells are managed locally by distributed control nodes that communicate through the local controller area network (CAN). Battery information is communicated to the remote user through TCP/IP. Both CAN and TCP/IP are connected through the gateway database, allowing for transitions from the battery process time and data volume domain into that of the remote user. The system architecture is based on multiple concurrent processes that facilitate necessary battery monitoring and charge management as well as availability of timely interaction with remote users. Autonomy of these processes is encouraged through the distributed data storage organization. Modeling and testing of the proposed architecture reflects the potential capacity for managing battery requirements and network traffic. Scalability of the approach to suit battery network size may also prove useful to serve other similar applications.  相似文献   

17.
Setting up either one or multiple conferences and managing the various devices can be a very difficult task. In this article a newly developed distributed video conference management system is explained and tested. © 1998 John Wiley & Sons, Ltd.  相似文献   

18.
A comprehensive network management function built into the interconnection network provides a means of meeting user needs of fault tolerance, performance, accounting, and security. However, meeting these needs on a heterogeneous interconnection network is several levels more complex than on a homogeneous network because of the existence of multiple protocol stacks for communication. An architecture that will solve this problem by analyzing the heterogeneous interconnection network as a single entity is proposed. The authors present the design issues evaluated in choosing this approach and establish the need for the various components in this architecture. An overview is presented of each of the components, and their place in the architecture is pointed out  相似文献   

19.
The critical issues in multivendor environments and operation systems of telecommunication networks essential to speeding up the handling of service orders and service restoration after failures are discussed. To overcome these problems as the software backlog grows, the authors propose the application of a telecommunications management network (TMN) architecture together with an object-oriented network resource (ONR) model. The second phase of the synchronous digital hierarchy (SDH) network management system, which is based on the TMN architecture and ONR model, is examined  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号