79 resultados para Key Management Protocol
em Doria (National Library of Finland DSpace Services) - National Library of Finland, Finland
Resumo:
Key management has a fundamental role in secure communications. Designing and testing of key management protocols is tricky. These protocols must work flawlessly despite of any abuse. The main objective of this work was to design and implement a tool that helps to specify the protocol and makes it possible to test the protocol while it is still under development. This tool generates compile-ready java code from a key management protocol model. A modelling method for these protocols, which uses Unified Modeling Language (UML) was also developed. The protocol is modelled, exported as an XMI and read by the code generator tool. The code generator generates java code that is immediately executable with a test software after compilation.
Resumo:
Tällä hetkellä haastavin telekommunikaatioteollisuuden tutkimus – ja kehitystoiminta on keskittynyt kolmannen sukupolven matkapuhelinjärjestelmien ympärille. Järjestelmien standardointityössä on saatu aikaiseksi ensimmäiset vakaat spesifikaatioversiot ja kaupallista toimintaa ollaan parhaillaan aloittelemassa Japanissa ja Euroopassa. Eräs kolmannen sukupolven järjestelmistä on UMTS (Universal Mobile Telecommunications System). Tämä diplomityö antaa yleiskuvan UMTS järjestelmästä ja sen eri verkkoelementtien toiminnallisuuksista. Päähuomio on kiinnitetty radioverkkojärjestelmään (UMTS Terrestrial Radio Access Network) ja erityisesti sen radioaliverkkojärjestelmään (Radio Network Subsystem), joka koostuu radioverkonohjaimesta (Radio Network Controller) ja joukosta siihen kuuluvia tukiasemia (Node B). Radioverkonohjain ja tukiasemat on yhdistetty avoimen rajapinnan kautta jota kutsutaan Iub -rajapinnaksi. Rajapinta tarjoaa radioverkonohjaimelle mahdollisuuden kontrolloida tukiasemia signalointiviestien avulla ja mahdollistaa tehokkaan ja luotettavan käyttäjätiedon siirron radioaliverkkojärjestelmän sisällä. Tämän diplomityön pääasiallinen sisältö on siirtoresurssien hallinta Iub -rajapinnan ylitse. Työssä esitellään ja selitetään siirtoverkon arkkitehtuuri. Myös kaikki Iub:ssä sijaitsevat protokollat ja toiminnalliset yksiköt jotka vaikuttavat siirtoresurssien hallintaan esitellään ja kuvataan yksityiskohtaisesti. Päähuomio on kiinnitetty sovellusprotokolliin sekä rajapinnan siirtoverkko- että radioverkkokerroksella sekä näiden protokollien väliseen vuorovaikutukseen. Kyseiset protokollat ovat Node B Application Part (NBAP) ja Access Link Control Application Part (ALCAP). Työn toteutusosassa käydään lävitse NBAP –protokollan prototyypin ja Node B Manager –toiminnallisen yksikön prototyypin implementaatio.
Resumo:
Today's communication networks consist of numerous interdependent network components. To manage these networks and to ensure their reliable and efficient operation to meet the increasing customer usability demands, extensive network management tools are required from the service provider. The goal of this study was to adapt the Next Generation Network (NGN) providing VoIP services within a performance oriented network management system. This study focuses only on NGN network and the project was implemented as an assignment of the Network Operations Center of Elisa Corporation. The theoretical part of this study introduces the network environment of the Elisa NGN platform: its components and used signalling protocols as well as other exploitable communication protocols. In addition, the Simple Network Management Protocol (SNMP) is closely examined since it is commonly used as the basis of IP (Internet Protocol) network management. Also some primary applications enabled by the NGN technology are introduced. The empirical part of this study contains a short overview of the implemented network performance management system and its properties. The most crucial monitored MIB modules, SNMP parameters and implemented performance measurements are described. The trap topology and the role of the traps for management of the NGN platform are considered and finally, the conclusion based on the several disquisitions is made supported with suggestions for future improvements.
Resumo:
This study focuses on corporate social responsibility (or CSR)as the latest dimension to emerge in the corporate responsibility and sustainability agenda, which in the recent past has rapidly risen to the top of the list of concerns for civil societies worldwide. Despite the continuing debates and discussions about the scope, benefits, and impacts of CSR to business and community in various sectors, levels, and types of society, many companies have moved forward to confront the opportunities and challenges of CSR. Thus, this study is about those proactive companies with a focus on the importance of CSR and its management inside and outside the company. It is an exploration and learning from the experience of Finnish companies, as well as other actors interested or involved in shaping the course of CSR, locally and globally. It also looks closely at how national culture affects the views, thinking, and management of CSR in a welfare state. This dissertation primarily draws on the analyses of information collected from a series of qualitative interviews and the existing literature in the area. This is complemented by an analysis of written and published documents on CSR from various sources. The results of the study give insightful information and detailed descriptions of a roadmap useful in learning and understanding CSR in Finnish companies. Despite the varying conceptual connotations, essential roadmap indicators point to the importance of framing CSR within the corporate responsibility concept, Finnish development and the welfare state system, globalization, stakeholders, and the pursuit of sustainable development as the main drivers of CSR, the remarkable progress of CSR in companies, and identification of key management areas and practices relevant to CSR. Similarly,the study reveals the importance of culture as essential in understanding and learning CSR. Finnish culture has a positive influence on the views, thinking, and management practices of CSR issues. Such a positive influence of culture, therefore, makes it easy for business people to discuss and understand CSR, because those CSR issues are already considered common and taken-for-granted by Finns and are implicit in the welfare state provisions. The experience of Finnish companies in implementing CSR policies in the supply chain is a concrete proactive step in advancing the message of CSR, that is, to bring companies and suppliers together to work on improving and strengthening relationships towards socially responsible practices worldwide. Such a forward step to deal with CSR issues in the supply chain reflects the companies' commitments and belief that CSR can be managed with the suppliers and gain positive benefits. Despite the problems and complexities, particularly in the global supply chain, managing CSR for Finnish companies presents new opportunities and challenges that are expected to intensify in the near future. The focus on CSR policy implementation inthe supply chain points to the importance of companies taking initiatives and forging cooperation with suppliers with the aim of addressing and improving CSR questions in the supply chains. The proactive stance of Finnish companies toward CSR is complemented by the active supporting role of important societalactors such as the government and NGOs. These actors carry out various promotional efforts and campaigns, thus bringing CSR into the mainstream of Finnish companies and strengthening the synergistic learning about CSR within the Finnish business and civil circles. The efforts of the government and NGOs to promote CSR are indicative of the importance of multipartite involvement and the emergence of better civil regulations. Likewise, their drive to learn from each other, exchange experiences, and contribute in CSR debates facilitated the evolution of CSRnetworks in the country. The results of this study add to the mounting evidence that CSR, in general, has created a new dimension in managing corporate sustainability. This study provides compelling empirical evidence and some direct quotations about CSR in the Finnish context. This information can be used to learn and gain new useful insights, approaches, and concepts for managing CSR.
Resumo:
Tässä diplomityössä selvitetään SNMP:n (Simple Network Management Protocol) hallintatietokantojen sisältämiä palvelunlaatutietoja. Tarkastelun kohteena ovat IP:n (Internet Protocol) ja ATM:n (Asynchronous Transfer Mode) hallintatietokannat. Työn teoriaosassa tarkastellaan verkonhallinnan eri osa-alueita, TCP/IP-verkkojen (Transmission Control Protocol) hallintaan tarkoitettua SNMP-protokollaa ja sen eri versioita. Lisäksi käsitellään palvelunlaadun kannalta IP ja ATM-verkkojen erilaisia toteutuksia. Työn kokeellissa osassa arvioidaan eri hallintatietokantojen sisältöä palvelunlaadun kannalta. Työssä todetaan palvelunlaatutietojen puutteellisuus hallintatietokannoissa ja sekä IP:lle että ATM:lle toteutetaan soveltuvat hallintatietokannat.
Resumo:
Multicast is one method to transfer information in IPv4 based communication. Other methods are unicast and broadcast. Multicast is based on the group concept where data is sent from one point to a group of receivers and this remarkably saves bandwidth. Group members express an interest to receive data by using Internet Group Management Protocol and traffic is received by only those receivers who want it. The most common multicast applications are media streaming applications, surveillance applications and data collection applications. There are many data security methods to protect unicast communication that is the most common transfer method in Internet. Popular data security methods are encryption, authentication, access control and firewalls. The characteristics of multicast such as dynamic membership cause that all these data security mechanisms can not be used to protect multicast traffic. Nowadays the protection of multicast traffic is possible via traffic restrictions where traffic is allowed to propagate only to certain areas. One way to implement this is packet filters. Methods tested in this thesis are MVR, IGMP Filtering and access control lists which worked as supposed. These methods restrict the propagation of multicast but are laborious to configure in a large scale. There are also a few manufacturerspecific products that make possible to encrypt multicast traffic. These separate products are expensive and mainly intended to protect video transmissions via satellite. Investigation of multicast security has taken place for several years and the security methods that will be the results of the investigation are getting ready. An IETF working group called MSEC is standardizing these security methods. The target of this working group is to standardize data security protocols for multicast during 2004.
Resumo:
Tietoverkkojen valvontajärjestelmiä on nykyään käytössä monissa eri verkkoympäristöissä. Näissä verkoissa käytetään useiden laitevalmistajien tuotteita, joita täytyy pystyä valvomaan. Tähän tarkoitukseen on kehitetty verkonhallintaprotokolla SNMP (Simple Network Management Protocol). Tässä työssä valvontaprotokollaa on tarkoitus soveltaa tietoverkkojen valvontaan. Tämä insinöörityö tehtiin osana Netcontrol Oy:n tuotekehitystä. Työn päätavoitteena oli kehittää toimiva ratkaisu verkonvalvontaan. Työssä tutkittiin myös verkonvalvonnan toteuttamista SNMP-protokollan avulla sekä eri verkonvalvonnan toteutusmalleja. Työn teoriaosuus tehtiin kirjallisuustutkimuksena. Teoriaosuudessa käydään läpi verkonvalvonnan taustoja, SNMP-protokollan eri versioiden ominaisuuksia ja tietokantojen rakennetta. Työn loppuosassa kerrotaan Windows-käyttöjärjestelmän SNMP-ohjelmista sekä avoimen lähdekoodin Net-SNMP-ohjelmasta. Lisäksi käydään läpi näiden ohjelmien käyttöönotto. Lopussa kerrotaan myös testijärjestelmän tuloksista yleisluontoisesti. Työ osoittaa, että SNMP:n avulla pystytään suorittamaan kattavaa verkonvalvontaa. SNMP:n toiminnallisuus saadaan aikaan työssä esitetyillä ohjelmistoilla eri tietoverkon laitteisiin. Laitteiden valvontaa pystytään suorittamaan SNMP-hallintaohjelmalla. Näiden ohjelmistojen avulla saadaan aikaan toimiva päästä päähän -ratkaisu verkonvalvontaan. Tarkemmat kuvaukset testijärjestelmistä ja kehitysmahdollisuuksista on sisällytetty liitteeseen, joka on luottamuksellinen.
Resumo:
The main objective of this study was to examine the pricing of customized industrial products in international markets, and to understand what pricing decision making consists of. Another purpose of the study was to identify the main factors that affect the pricing decisions of industrial companies, as well as the different pricing strategies industrial companies may choose when pricing customized products. The research was conducted as a qualitative single case study, and a Finnish industrial company specializing in indoor environment solutions, Halton Marine Oy, was used as the case company in the study. The primary data was collected through semi-structured theme interviews with the key management personnel of the company, and the results were discussed and analyzed in the light of the existing literature. The results of this study indicate that the pricing of customized industrial products consists of several dimensions, and is influenced by a large variety of factors that are both internal and external to the firm. In addition, it was found that the choice of a pricing strategy is largely dependent on the chosen segment, the product category, and the stage in the product life cycle. The results also suggest that customizing companies should consider using the value-based pricing orientation, since customization is closely linked to customer value.
Resumo:
Tutkimuksen tarkoituksena oli tunnistaa nykyiset sekä potentiaaliset avainasiakkaat case yritykselle. Avainasiakkaat tunnistettiin Chevertonin tunnistamis- ja valintamatriisin avulla, jossa asiakkaan sijoittumista matriisiin arvioidaan asiakkaan houkuttelevuuden sekä toimittajan suhteellisten vahvuuksien avulla. Kriteereiksi avainasiakkaiden tunnistamiseen valittiin asiakkaan vuotuinen ostovolyymi, asiakkaan business-potentiaali sekä case-yrityksen toimittajaosuus. Asiakkaat luokiteltiin avainasiakkaisiin, kehitettäviin avainasiakkaisiin, ylläpidettäviin asiakkaisiin sekä satunnaisiin asiakkaisiin. Tutkimus tarjosi lähtökohdan case-yrityksen uusille avainasiakaspäälliköille sekä osoitti suunnan tulevaisuuden tutkimustarpeille. Aktiivisen tiedonvaihdannan kautta eri myyntikonttoreiden johtohenkilöstön sekä myös yrityksen eri funktionaalisten divisioonien välillä voidaan saavuttaa kilpailuetua kun lähestytään asiakasta toimintojaan järkiperäisesti koordinoineena toimittajana samalla kun asiakkaat keskittävät ostojaan. Jotta yrityksen tavoitteet, markkinamahdollisuudet sekä resurssit olisivat hyvin tasapainossa, tulisi myös asiakaskannattavuutta sekä asiakkaiden strategista merkittävyyttä arvioida ja mitata säännöllisesti tässä tutkimuksessa käytettyjen tunnistuskriteereiden lisäksi.
Resumo:
Tutkimusongelmana oli kuinka tiedon johtamisella voidaan edesauttaa tuotekehitysprosessia. Mitkä ovat ne avaintekijät tietoympäristössä kuin myös itse tiedossa, joilla on merkitystä erityisesti tuotekehitysprosessin arvon muodostumiseen ja prosessien kehittämiseen? Tutkimus on laadullinen Case-tutkimus. Tutkimusongelmat on ensin selvitetty kirjallisuuden avulla, jonka jälkeen teoreettinen viitekehys on rakennettu tutkimaan rajattua ongelma-aluetta case-yrityksestä. Empiirisen tutkimuksen materiaali koostuu pääasiallisesti henkilökohtaisten teemahaastattelujen aineistosta. Tulokset merkittävimmistä tiedon hyväksikäytön haittatekijöistä, kuten myös parannusehdotukset on lajiteltu teoreettisessa viitekehyksessä esitettyjen oletustekijöiden mukaan. Haastatteluissa saadut vastaukset tukevat kirjallisuudesta ja alan ammattilaiselta saatua käsitystä tärkeimmistä vaikuttavista tekijöistä. Tärkeimmät toimenpiteet ja aloitteet joilla parannettaisiin tiedon muodostumista, koskivat ennnen kaikkea työnteon ulkoisia olosuhteita, eikä niinkään tiedon muodostumisen prosessia itseään. Merkittävimpiä haittatekijöitä olivat kultturiin, fyysiseen ja henkiseen tilaan ja henkilöstöresursseihin liittyvät ongelmat. Ratkaisuja ongelmiin odotettiin saatavan lähinnä tietotekniikan, henkilöstöresurssien ja itse tiedon muokkaamisen avulla. Tuotekehitysprosessin ydin tietovirtojen ja –pääomien luokittelu ja tulkitseminen tiedon muodostusta kuvaavan Learning Spiralin avulla antoi lähinnä teoreettisia viitteitä siitä millaisia keinoja on olemassa tiedon lisäämiseen ja jakamiseen eri tietotyypeittäin. Tulosten perusteella caseyrityksessä pitäisi kiinnittää erityistä huomiota tiedon dokumentointiin ja jakamiseen erityisesti sen tiedon osalta, joka on organisaatiossa vain harvalla ja/tai luonteeltaan hyvin tacitia.
Resumo:
Organizations gain resources, skills and technologies to find out the ultimate mix of capabilities to be a winner in the competitive market. These are all important factors that need to be taken into account in organizations operating in today's business environment. So far, there are no significant studies on the organizational capabilities in the field of PSM. The literature review shows that the PSM capabilities need to be studied more comprehensively. This study attempts to reveal and fill this gap by providing the PSM capability matrix that identifies the key PSM capabilities approached from two angles: there are three primary PSM capabilities and nine subcapabilities and, moreover, the individual and organizational PSM capabilities are identified and evaluated. The former refers to the PSM capability matrix of this study which is based on the strategic and operative PSM capabilities that complement the economic ones, while the latter relates to the evaluation of the PSM capabilities, such as the buyer profiles of individual PSM capabilities and the PSMcapability map of the organizational ones. This is a constructive case study. The aim is to define what the purchasing and supply management capabilities are and how they can be evaluated. This study presents a PSM capability matrix to identify and evaluate the capabilities to define capability gaps by comparing the ideal level of PSM capabilities to the realized ones. The research questions are investigated with two case organizations. This study argues that PSM capabilities can be classified into three primary categories with nine sub-categories and, thus, a PSM capability matrix with four evaluation categories can be formed. The buyer profiles are moreover identified to reveal the PSM capability gap. The resource-based view (RBV) and dynamic capabilities view (DCV) are used to define the individual and organizational capabilities. The PSM literature is also used to define the capabilities. The key findings of this study are i) the PSM capability matrix to identify the PSM capabilities, ii) the evaluation of the capabilities to define PSM capability gaps and iii) the presentation of the buyer profiles to identify the individual PSM capabilities and to define the organizational PSM capabilities. Dynamic capabilities are also related to the PSM capability gap. If a gap is identified, the organization can renew their PSM capabilities and, thus, create mutual learning and increase their organizational capabilities. And only then, there is potential for dynamic capabilities. Based on this, the purchasing strategy, purchasing policy and procedures should be identified and implemented dynamically.
Resumo:
The ability of the supplier firm to generate and utilise customer-specific knowledge has attracted increasing attention in the academic literature during the last decade. It has been argued the customer knowledge should treated as a strategic asset the same as any other intangible assets. Yet, at the same time it has been shown that the management of customer-specific knowledge is challenging in practice, and that many firms are better at acquiring customer knowledge than at making use of it. This study examines customer knowledge processing in the context of key account management in large industrial firms. This focus was chosen because key accounts are demanding and complex. It is not unusual for a single key account relationship to constitute a complex web of relationships between the supplier and the key account – thus easily leading to the dispersion of customer-specific knowledge in the supplier firm. Although the importance of customer-specific knowledge generation has been widely acknowledged in the literature, surprisingly little attention has been paid to the processes through which firms generate, disseminate and use such knowledge internally for enhancing the relationships with their major, strategically important key account customers. This thesis consists of two parts. The first part comprises a theoretical overview and draws together the main findings of the study, whereas the second part consists of five complementary empirical research papers based on survey data gathered from large industrial firms in Finland. The findings suggest that the management of customer knowledge generated about and form key accounts is a three-dimensional process consisting of acquisition, dissemination and utilization. It could be concluded from the results that customer-specific knowledge is a strategic asset because the supplier’s customer knowledge processing activities have a positive effect on supplier’s key account performance. Moreover, in examining the determinants of each phase separately the study identifies a number of intra-organisational factors that facilitate the process in supplier firms. The main contribution of the thesis lies in linking the concept of customer knowledge processing to the previous literature on key account management. Moreover, given than this literature is mainly conceptual or case-based, a further contribution is to examine its consequences and determinants based on quantitative empirical data.
Resumo:
The importance of Information Technology (IT) in the business environment is continuously growing. This stimulates the increase of size, complexity and number of IT projects and raises the need for IT Project Portfolio Management (IT PPM). While being actively discussed for the last few decades, IT PPM has a short history of practical implementation. This creates inconsistency in the views of different authors and provides an opportunity for additional research. As a first step, this research explores the existing studies and brings together the views of different authors on IT PPM. As a result, a high-level IT PPM Process Cycle and a set of Key Success Factors for IT PPM are proposed. IT PPM Process Cycle gives an overview of the main elements of IT PPM process, while the set of Key Success Factors provides a number of factors that should be considered during the implementation. As a second step, both theoretical deliverables are empirically tested by a case study and a survey conducted in a big multinational company. The case study is used to analyze process framework of the studied company towards the developed IT PPM Process Cycle. Subsequently, a survey was conducted among subject matter experts of the same company to evaluate the importance and relevance of the proposed Key Success Factors. Finally, this thesis concludes with findings made during the case study and provides an empirically tested selection of factors to be taken into account. These two deliverables can be used by both academics and practitioners to close the gaps in existing literature and assist in IT PPM implementation.
Resumo:
The goal of this study is to deepen the understanding of the customer portfolio management process. There are many models for the process, and they are not necessarily exclusive of each other. Consequently, the inclusion of many models might even prove out to be beneficial. Other theoretical framework include the current economical situation and its propose on customer portfolio management. With an understanding of the theoretical models as a background, the empirical part of this study compares Finnish multinational medical and healthcare technology companies’ customer portfolio management practices. The empirical research was carried out with theme interviews held with 11 sales and marketing managers or directors from four different companies. The goal was to discover the most essential practices of the process steps in the companies. The result of this study is that there is a lack of systematic customer portfolio management, but most companies are aiming to improve this in the near future. The most essential practices are analysis of sales, communication level, learning, and commitment to strategy of the focal company. Special characteristics of this industry include large business networks that include customers, professional end-users, institutions, universities, researchers, and key opinion leaders. The management and analysis of this comprehensive network has been seen to be extremely important for this industry.
Resumo:
This thesis reveals the topic of reputational risk management as a key element for business continuity and value maximization. The purpose of the work is to investigate reputational risk from the side of its definition, management (including legal requirements on this risk category) and measurement and to analyse reputational risk’s impact on business continuity and value maximization. To be able to do this, different respective articles, reports of financial institutions are gathered and constructive summaries and analysis are made. In order to deeply investigate the impact of reputational risk on business continuity and value maximization, it was chosen to study it from three aspects: 1) check the impact of stock valuation of 7 companies that experienced reputational catastrophe / risk, 2) analyse a case study on disagreements in management of reputational risk among case companies and impact on their respective performance, and 3) conduct a survey of financial sector companies in Liechtenstein to see how reputational risk management works in practice. The findings of the research showed a significant impact of reputation decadence on company’s value and trading volume, and showed crucial importance of post-crisis management for the company’s financial performance. The results of the qualitative research based on survey proved that companies consider reputational risk management as a one of the key elements for their business continuity and value maximization.