A Framework for Network Management Using Mobile Agents
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
The Study and Implementation of the VPN Service Management System
ISCC '00 Proceedings of the Fifth IEEE Symposium on Computers and Communications (ISCC 2000)
Agent Tcl: a flexible and secure mobile-agent system
TCLTK'96 Proceedings of the 4th conference on USENIX Tcl/Tk Workshop, 1996 - Volume 4
Mobile agents for network management
IEEE Communications Surveys & Tutorials
Advanced network monitoring applications based on mobile/intelligent agent technology
Computer Communications
IEEE Journal on Selected Areas in Communications
Internet service monitoring with mobile agents
IEEE Network: The Magazine of Global Internetworking
Hi-index | 0.00 |
Virtual private network (VPN) not only possesses the low cost, inexpensive fees, and excellent support advantages of the Internet, it also has the benefit of the security as the leased line. How to properly manage the VPN is an issue in which the enterprise IT engineers have to take seriously. This research is based on the new network management technologies such as policy-based network management, mobile agent, etc., to design a VPN monitor and management system architecture that contains high level management with low network traffic load. This system architecture integrates both VPN devices and general network devices, such the feature can integrate the monitor and manage the VPN and Intranet at the same time. The result of this research provides enterprises with a VPN architecture for monitoring and managing the enterprises, as well as to establish a prototype for the enterprise VPN monitor and management system. Such system architecture can effectively assist the semiconductor companies to monitor and manage their enterprise VPN in order to utilize the Internet resources, and to reduce the possible operation off time. The prototype system could proof the feasibility of the systematic architecture, it can automatically detect and activate the backup mechanism according to the preset management policy, and to achieve the effective and fast solution for the enterprise network problems.