Technology of network management for pervasive computing

被引:0
作者
Qu, Ming [1 ]
Liu, Shufen [1 ]
Bao, Tie [1 ]
Han, Lu [1 ]
机构
[1] Jilin Univ, Dept Coll Comp Sci & Technol, Jilin, Peoples R China
来源
2006 1ST INTERNATIONAL SYMPOSIUM ON PERVASIVE COMPUTING AND APPLICATIONS, PROCEEDINGS | 2006年
关键词
pervasive computing; computer network management; GSS-API; application portability;
D O I
10.1109/SPCA.2006.297554
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article, a model of computer network management is presented in detail in order to monitoring the network for the administrator to see the distribution of the flow online, which can be used to monitoring the statistic and the analysis of the traffic in the network, combines the theory of pervasive computing with the traditional technology of network management. As an important part in this model, a security service module based on GSS-API (Generic Security Service Application Program Interface) has been designed in this thesis in order to provide the application portability.
引用
收藏
页码:122 / +
页数:3
相关论文
共 10 条
[1]  
ABADI M, 1998, J COMPUTER SECURITY, V6, P7
[2]  
CASE JD, 1990, RFC1157 INT NETW WOR
[3]  
GALVIN JM, 1445 RFC INT NETW WO
[4]   ON THE SELF-SIMILAR NATURE OF ETHERNET TRAFFIC (EXTENDED VERSION) [J].
LELAND, WE ;
TAQQU, MS ;
WILLINGER, W ;
WILSON, DV .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1994, 2 (01) :1-15
[5]  
MAN Y, 2003, COMPUTER ENG APPL, P180
[6]   WIDE AREA TRAFFIC - THE FAILURE OF POISSON MODELING [J].
PAXSON, V ;
FLOYD, S .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1995, 3 (03) :226-244
[7]  
SHEN J, 2002, J COMPUTER RES DEV S, V39, P1153
[8]   Self-similar processes in communications networks [J].
Tsybakov, B ;
Georganas, ND .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (05) :1713-1725
[9]   Self-similarity through high-variability: Statistical analysis of ethernet LAN traffic at the source level [J].
Willinger, W ;
Taqqu, MS ;
Sherman, R ;
Wilson, DV .
IEEE-ACM TRANSACTIONS ON NETWORKING, 1997, 5 (01) :71-86
[10]  
WRAY J, 2000, RFC2744, P1