Font Size: a A A

Research And Realization Of Policy-Based Distributed Network Intelligent Management Model

Posted on:2006-06-14Degree:MasterType:Thesis
Country:ChinaCandidate:S LuoFull Text:PDF
GTID:2178360182961299Subject:Computer applications
Abstract/Summary:PDF Full Text Request
With the expansion of the scale in the network, and increasing of the variety and quantity, the network management become more and more complicated, and how to deal with such problem become a hot topic. Therefore, policy as a approach to cooperate with the commercial model and concrete network management, and network security realization, become a critic point to solve the problem. policy management is to enhance the efficiency in resource allocation and to provide user with the new operation, and to promote the maintenance in network security. based policy network management control the bandwidth and network access according to the define policy, which stem from the dynamic elements (such as the daily time, and application priority and status of the network). The managed client can be user, application and host, and the managed resource can be provide static or dynamic depend on the using time and resource, and the authority of the client.This paper presents a application and research of PBNM system in the network security. The dissertation is made up of five chapters and mainly dissertates the following questionsFirstly, on the basis of the requirement of the network manage system, this paper presents the necessary of the policy manage and the current development on it and the motivation on the research. Then, it describes the technology of the policy manage and its implementation area: Security, and introduces the background knowledge of the IPSec protocol.Secondly , the paper proposes the tier of the distribute pbnm system architecture, and design a concrete intelligent manage model, and introduce the basic work flow according to the related component, and introduce the model policy description, then analyst the main features, and introduce some specification and term.Finally, taking security into account, the application of IPSec protocol often combines with other technologies. This paper illustrates a design of security policy manage and negotiation scheme according to the requirement of the reality under the architecture of PBNM system and the IPSec protocol. And then it takes a real security process system as an example to introduce the implementation system.
Keywords/Search Tags:Network manager, PBNM, IPSec, Network Security
PDF Full Text Request
Related items