• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 29
  • 25
  • 8
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 120
  • 27
  • 25
  • 22
  • 20
  • 18
  • 12
  • 12
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 8
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Routing Interior

Andersson, Johan, Kleihs, Marcus January 2013 (has links)
När datatrafik färdas genom ett nätverk så passerar det routrar och switcharsamtidigt som dessa enheter visar åt vilket håll paketet ska skickas. Detta kallas förrouting. För att paketen ska hitta rätt väg så använder man sig av routingprotokoll,som vägleder trafiken dit de ska, och olika protokoll har olika fördelar samtidigtsom de används vid olika tillfällen. Målet var att skapa ett stort enhetligt nätverksom tål höga belastningar, har en hög uppkopplingsprocent samtidigt som det skavara lätt att expandera i framtiden. Det största problemet var hur trafiken färdasmellan varje kontor, men problem som hur användarna ska vara uppkopplade tillInternet tas upp i rapporten. Nätverket använder sig av OSPF som routingprotokoll.Varje kontor delas in i områden, totallystubby area, vilket kortar nedroutingtabellen i Stockholm. Resultatet blir att snabba beslut tas när paket skaskickas inom ett kontor och när det ska utanför ett kontor så används en defaultroute. Samtidigt som kontoren är lätta att bygga ut då totallystubby area har endefault route till Stockholm.
2

Réintroduction du cisco de fumage (coregonus hoyi) dans le Lac Ontario : diversité génétique et consanguinité /

Favé, Marie-Julie. January 2006 (has links) (PDF)
Thèse (M. Sc.)--Université Laval, 2006. / Bibliogr.: f. 73-80. Publié aussi en version électronique dans la Collection Mémoires et thèses électroniques.
3

Netzentwicklung im CSN Netzstruktur des Chemnitzer StudentenNetzes CSN; Bestands- und Strategiepapier /

Schade, Markus. January 2004 (has links)
Chemnitz, Techn. Univ., [Studienarb.].
4

Inventering korskopplingsrum och switchar

Skalieri, Styliani January 2022 (has links)
I den här studien har en inventering av alla korskopplingsrum på Folktandvården Stockholm utförts. Målet var att ta reda på hur många av Folktandvårdens switchar som behövde bytas ut samt till vilken modell de skulle bytas ut. Resultatet blev att det är 49 stycken switchar som behövde bytas ut. Enligt denna studie skulle den nya modellen på switcharna vara av märket Cisco Catalyst 9300 då den visade sig vara mest lämplig samt kostnadseffektiv. I studien skulle även ett förslag på bättre organisering för de olika korskopplingsskåpen utföras så att ett mer effektivt och tidsbesparande arbetssätt kan tillämpas på klinikerna. Resultatet för detta finns beskrivet i form av en instruktion som ska publiceras på Folktandvårdens intranät så att de IT-ansvariga på klinikerna kan ta del av den.
5

Determination of marine migratory behavior and its relationship to selected physical traits for least cisco (Coregonus sardinella) of the western Arctic coastal plain, Alaska

Seigle, John C. 19 December 2003 (has links)
With increased resource development on the western Arctic coastal plain of Alaska (especially within the oil extraction industry) it is important to understand the basic life history attributes of whitefish stocks in the region in order to ensure appropriate management. These fish are a crucial part of subsistence harvests for native Alaskans. Multiple forms of the whitefish least cisco (Coregonus sardinella) have been described based on both appearance and life history traits. Two major forms of least cisco have been mentioned in the literature: a larger normal amphidromous form with fork lengths of approximately 420 mm and a dwarf lake resident form with lengths up to 230 mm. However, there is considerable evidence for additional forms and life history strategies of least cisco. I investigated the relationship between migratory behavior and selected physical traits of least cisco in six lakes and one brackish lagoon in the western Arctic coastal plain of Alaska. I used electron microprobe technology to determine the levels of Sr and Ca in the otoliths of 258 least cisco in order to resolve their marine migratory life history. I also investigated the relationship between migratory behavior and the numbers of gill rakers, lateral line scales, anal rays and dorsal rays as well as condition factor. The vast majority of least cisco captured in these sites were normal in form, yet only ~12% of all samples yielded any sign of sea-run behavior. Evidence for migratory behavior was low even for sites within close proximity to brackish waters. Fish exhibiting marine migratory behavior tended to make their first migrations to sea before age three (mean=2.6 years), although fish in one coastal site (Joeb's) averaged over 5 years of age at first marine visit. There was some evidence of higher condition factors for fish with sea-run migratory experience. There were significant differences in lateral line and dorsal ray numbers among sites but none for anal rays or gill rakers. Variability in all of these characters was high, and fish from coastal sites tended to have greater variability than those from inland sites. Only dorsal rays showed significant differences in meristic traits between sea-run and resident least cisco. These results suggest that least cisco exhibit high variability in physical traits. Also, least cisco appear to be flexible in their use of the marine environment, even within similar forms in the same lake. Some of the most basic life history characteristics of least cisco remain uncertain. With increased resource extraction occurring on the western Arctic coastal plain of Alaska, it is important to continue to investigate these and other life history strategies so as to ensure a sustainable fishery for native inhabitants of the region. / Graduation date: 2004
6

Optimizations of Cisco’s Embedded Logic Analyzer Module

Yang, Fangjin January 2009 (has links)
Cisco’s embedded logic analyzer module (ELAM) is a debugging device used for many of Cisco’s application specific integrated chips (ASICs). The ELAM is used to capture data of interest to the user and stored for analysis purposes. The user enters a trigger expression containing data fields of interest in the form of a logical equation. The data fields associated with the trigger expression are stored in a set of Match and Mask (MM) registers. Incoming data packets are matched against these registers, and if the user-specified data pattern is detected, the ELAM triggers and begins a countdown sequence to stop data capture. The current ELAM implementation is restricted in the form of trigger expressions that are allowed and in the allocation of resources. Currently, data fields in the trigger expression can only be logically ANDed together, Match and Mask registers are inefficiently utilized, and a static state machine exists in the ELAM trigger logic. To optimize the usage of the ELAM, a trigger expression is first treated as a Boolean expression so that minimization algorithms can be run. Next, the data stored in the Match and Mask registers is analyzed for redundancies. Finally, a dynamic state machine is programmed with a distinct set of states generated from the trigger expression. This set of states is further minimized. A feasibility study is done to analyze the validity of the results.
7

Optimizations of Cisco’s Embedded Logic Analyzer Module

Yang, Fangjin January 2009 (has links)
Cisco’s embedded logic analyzer module (ELAM) is a debugging device used for many of Cisco’s application specific integrated chips (ASICs). The ELAM is used to capture data of interest to the user and stored for analysis purposes. The user enters a trigger expression containing data fields of interest in the form of a logical equation. The data fields associated with the trigger expression are stored in a set of Match and Mask (MM) registers. Incoming data packets are matched against these registers, and if the user-specified data pattern is detected, the ELAM triggers and begins a countdown sequence to stop data capture. The current ELAM implementation is restricted in the form of trigger expressions that are allowed and in the allocation of resources. Currently, data fields in the trigger expression can only be logically ANDed together, Match and Mask registers are inefficiently utilized, and a static state machine exists in the ELAM trigger logic. To optimize the usage of the ELAM, a trigger expression is first treated as a Boolean expression so that minimization algorithms can be run. Next, the data stored in the Match and Mask registers is analyzed for redundancies. Finally, a dynamic state machine is programmed with a distinct set of states generated from the trigger expression. This set of states is further minimized. A feasibility study is done to analyze the validity of the results.
8

Správa sítí s Mobile IP pomocí SNMP / Managing Mobile IP enabled networks with SNMP protocol

Závodný, Ondřej January 2011 (has links)
The content of this thesis is to research possibilities of using SNMP for management of Mobile IP activated entities. The first two chapters deal with theoretical analysis of Mobile IP protocol, and Simple Network Management Protocol. The Mobile IP protocol analysis focuses especially on the elements Home agent and Foreign agent. In the SNMP chapter the analysis focuses mainly on ways to exchange messages. Another part of the document is devoted to a description of laboratory networks com- posed of routers Cisco 1841 and the configuration of them. Finally is described the programmed application to manager these devices in JAVA, which is included in Annex. The program periodically sends SNMP queries and finds relationships between the Home agent and the mobile nodes, and between the foreign agent and the mobile nodes. The application has a user-friendly interface that is shown on the attached flash animation. Finally, the thesis summarizes the concepts described in previous chapters and the goals to achieve.
9

Rozbor protokolů CISCO sítí / Protocols Analysis of CISCO Networks

Karlík, Martin January 2016 (has links)
ABSTRACT Bc.Karlík, Martin Department of Telecommunications, Faculty of Electrical Engineering and Communication, Brno University of Technology. Analysis of CISCO networking protocols This semestral thesis is focused on CISCO networks and protocols like MPLS, BGP, Ipv4, Ipv6, Multicast – sprase / dense mode. The task was study of those protocols and design and implement lab excercise with one of those protocols by using free network simulator GNS3. In this excercise is used CISCO router 3745.
10

Virtuální privátní sítě na bázi technologie MPLS / MPLS based virtual private networks

Daněk, Michal January 2017 (has links)
Master thesis deals with architecture of network based on multiprotocol label switching technology (MPLS). Work also describes use of this technology for point to point or multipoint connections based on network or data link layer. The practical part is focused on design of laboratory task which is aimed to configuration of virtual private LAN service (VPLS). This technology emulates multipoint connection based on the data link layer.

Page generated in 0.048 seconds