Research of Typical VPN Network Management Mechanisms

2013 ◽  
Vol 380-384 ◽  
pp. 2510-2514
Author(s):  
Zai Ying Liu ◽  
Ping Yang ◽  
Li Xiao Zhang

VPN based on the internet can not only make some enterprises save a large amount of costs, but also has better scalability, security and reliability. The paper introduced the concept and classifications of VPN, and described the key technologies of IPsec VPN and MPLS VPN. At last, we put the emphasis on the VPN network management mechanism, including fault management, performance management and tunnel management.

Author(s):  
Kadir Alpaslan Demir ◽  
Buğra Turan

The introduction of Industry 4.0 has increased the focus on a number of technologies. These technologies also help realize the vision for intelligent cities. Furthermore, there are already discussions of Industry 5.0. One emerging aspect of Industry 5.0 is human-robot co-working. With the help of artificial intelligence, the internet of things paradigm, Industry 4.0, and Industry 5.0 visions, there will be two predominant types of systems interfacing with people in intelligent cities. These are robotic and ambient intelligence systems. The increasing deployment of these will help make cities even smarter. However, we need to see advancements in a number of relevant key technologies, including power and networking technologies. In this chapter, first, the authors briefly discuss Industry 4.0, Industry 5.0, and intelligent cities paradigm, as well as robotic and ambient intelligence systems. Then, they focus on developing trends in power and networking technologies.


Author(s):  
Ahmad Ali Mohassesi ◽  
Rozita Shahbaz Keshvari

This research investigated the use of the strategic planning process in improving the management performance of private sector in Iran. Measuring performance is a necessary management practice if action is to result in desired outcomes. An important objective of the Iranian private sector was to focus the attention of private servants on clear specified results rather than bureaucratic procedures. The development of performance management to date appears inadequate in that the most important component of results – outcomes is overlooked from the measurement. Primary data were collected through structured questionnaire with 100 respondents from 20 randomly selected private sectors in different environment. The findings showed the necessity of implementation of strategic planning in private sector concerning the use of appropriate performance management tools and strengthening the implementation of strategic planning functions in order to improve management performance. These findings suggest that specific management function-focused process should be designed and implemented.


2019 ◽  
Vol 5 ◽  
Author(s):  
John Lannon

As the non-profit sector becomes increasingly dependent on projects to achieve its strategic goals, the use of formal project management processes can help to demonstrate to stakeholders that an organisation is taking steps to improve its performance. However the adoption of processes drawn from the for-profit sector does not always yield the desired results. In particular existing performance management systems and quality management systems are unsuitable for the implementation, measurement, and improvement of project management practices in the sector. A new model is therefore proposed for non-profit project management performance assessment. This is based on a conceptual analysis of the European Foundation for Quality Management (EFQM) business excellence model, a project management performance assessment model used primarily in for-profit environments, and an assessment of criteria particular to non-profit organisations. The model is multi-dimensional, flexible, and accounts for multiple stakeholder views. After using it, non-profit organisations can reflect on their performance, create an improvement plan, and use the model again to test their progress.


2020 ◽  
Vol 2020 ◽  
pp. 1-20
Author(s):  
Jing Tian ◽  
Gang Xiong ◽  
Zhen Li ◽  
Gaopeng Gou

In order to protect user privacy or guarantee free access to the Internet, the network covert channel has become a hot research topic. It refers to an information channel in which the messages are covertly transmitted under the network environment. In recent years, many new construction schemes of network covert channels are proposed. But at the same time, network covert channel has also received the attention of censors, leading to many attacks. The network covert channel refers to an information channel in which the messages are covertly transmitted under the network environment. Many users exploit the network covert channel to protect privacy or guarantee free access to the Internet. Previous construction schemes of the network covert channel are based on information steganography, which can be divided into CTCs and CSCs. In recent years, there are some covert channels constructed by changing the transmission network architecture. On the other side, some research work promises that the characteristics of emerging network may better fit the construction of the network covert channel. In addition, the covert channel can also be constructed by changing the transmission network architecture. The proxy and anonymity communication technology implement this construction scheme. In this paper, we divide the key technologies for constructing network covert channels into two aspects: communication content level (based on information steganography) and transmission network level (based on proxy and anonymity communication technology). We give an comprehensively summary about covert channels at each level. We also introduce work for the three new types of network covert channels (covert channels based on streaming media, covert channels based on blockchain, and covert channels based on IPv6). In addition, we present the attacks against the network covert channel, including elimination, limitation, and detection. Finally, the challenge and future research trend in this field are discussed.


Author(s):  
Gary P. Latham ◽  
Lorne M. Sulsky ◽  
Heather MacDonald

A distinguishing feature of performance management relative to performance appraisal is that the former is an ongoing process whereas the latter is done at discrete time intervals (e.g. annually). Ongoing coaching is an integral aspect of performance management. Performance appraisal is the time period in which to summarize the overall progress that an individual or team has made as a result of being coached, and to agree on the new goals that should be set. Common to the performance management/appraisal process are the four following steps. First, desired job performance must be defined. Second, an individual's performance on the job must be observed. Is the person or team's performance excellent, superior, satisfactory, or unacceptable? Third, feedback is provided and specific challenging goals are set as to what the person or team should start doing, stop doing, or be doing differently. Fourth, a decision is made regarding retaining, rewarding, training, transferring, promoting, demoting, or terminating the employmemt of an individual.


2008 ◽  
Vol 2008 ◽  
pp. 1-11 ◽  
Author(s):  
José R. C. Piqueira ◽  
Felipe Barbosa Cesar

Nowadays, digital computer systems and networks are the main engineering tools, being used in planning, design, operation, and control of all sizes of building, transportation, machinery, business, and life maintaining devices. Consequently, computer viruses became one of the most important sources of uncertainty, contributing to decrease the reliability of vital activities. A lot of antivirus programs have been developed, but they are limited to detecting and removing infections, based on previous knowledge of the virus code. In spite of having good adaptation capability, these programs work just as vaccines against diseases and are not able to prevent new infections based on the network state. Here, a trial on modeling computer viruses propagation dynamics relates it to other notable events occurring in the network permitting to establish preventive policies in the network management. Data from three different viruses are collected in the Internet and two different identification techniques, autoregressive and Fourier analyses, are applied showing that it is possible to forecast the dynamics of a new virus propagation by using the data collected from other viruses that formerly infected the network.


Sign in / Sign up

Export Citation Format

Share Document