Spelling suggestions: "subject:"risco"" "subject:"disco""
111 |
Analysis of Data Center Network Convergence TechnologiesLeBlanc, Robert-Lee Daniel 01 July 2014 (has links) (PDF)
The networks in traditional data centers have remained unchanged for decades and have grown large, complex and costly. Many data centers have a general purpose Ethernet network and one or more additional specialized networks for storage or high performance low latency applications. Network convergence promises to lower the cost and complexity of the data center network by virtualizing the different networks onto a single wire. There is little evidence, aside from vendors' claims, that validate network convergence actually achieves these goals. This work defines a framework for creating a series of unbiased tests to validate converged technologies and compare them to traditional configurations. A case study involving two different network converged technologies was developed to validate the defined methodology and framework. The study also shows that these two technologies do indeed perform similarly to non-virtualized network, reduce costs, cabling, power consumption and are easy to operate.
|
112 |
Performance analysis of management techniques for SONET/SDH telecommunications networksNg, Hwee Ping. 03 1900 (has links)
Approved for public release, distribution is unlimited / The performance of network management tools for SONET/SDH networks subject to the load conditions is studied and discussed in this thesis. Specifically, a SONET network which consists of four CISCO ONS 15454s, managed by a CISCO Transport Manager, is set up in the Advanced Network Laboratory of the Naval Postgraduate School. To simulate a realistic data transfer environment for the analysis, Smartbits Avalanche software is deployed to simulate multiple client-server scenarios in the SONET network. Traffic from the management channel is then captured using a packet sniffer. Queuing analysis on the captured data is performed with particular emphasis on properties of self-similarity. In particular, the Hurst parameter which determines the captured traffic's degree of self-similarity is estimated using the Variance-Index plot technique. Link utilization is also derived from the computation of first-order statistics of the captured traffic distribution. The study shows that less management data was exchanged when the SONET network was fully loaded. In addition, it is recommended that CTM 4.6 be used to manage not more than 1552 NEs for safe operation. The results presented in this thesis will aid network planners to optimize the management of their SONET/SDH networks. / Civilian, Ministry of Defense, Singapore
|
113 |
Implementación de Sistema Integrador de Comunicaciones de Voz y Datos para el Gobierno Regional de Lima - Utilizando Plataforma Cisco Unified Communications Manager 7.0Farro Lazo, Jorge January 2010 (has links)
Technology nowadays is evolving at rates that surpass anything imagination could perceive and
it certainly affects every public or private enterprise. Well, according to this topic, I’m
suggesting the improvement of the communications network of the Regional Government of
Lima based on an integrated data and voice platform which includes a Cisco Centralized IP
Telephony solution, called Cisco Unified Communications Manager 7.0, that works as a main
element in order to achieve meaningful and complete management of internal and external
telephone calls within MPLS Networks. Regional Government of Lima has been chosen because
of its importance related to the economic activities of the population and the support that could
be brought by an institution which could make success and generate productivity about rapid
administrative processes .
The thesis is divided into distinct chapters that make up the context of the investigation
which involves network planning and design as an iterative process, encompassing topological
design, network realization, IT asset sourcing and operations planning. For this purpose,
information about the old and non sophisticated network status was raised. Costs and more
details such as hardware and software features and more ways to make this network work so
much better, with all the resources at its disposal, will be found on this whole solution
|
114 |
Roaming ve WiFi sítích / Roaming in WiFi networksLabuda, Adam January 2018 (has links)
This work deals with roaming issues in the WiFi network. Takes options from a 802.11 standard view. Factory setting options for fast roaming from CISCO and MikroTik. It proposes to measure and test these networks.
|
115 |
Modelování protokolů HSRP a GLBP pro redundanci brány / Modelling HSRP and GLBP Gateway Redundancy ProtocolsHoluša, Jan January 2016 (has links)
This thesis deals with theoretical analysis of First Hop Redundancy Protocols. It describes Hot Standby Router Protocol, Virtual Router Redundancy Protocol and Gateway Load Balancing Protocol. It also shows examples of configuration of each protocol on Cisco devices with supported version of the Cisco IOS. Furthermore, this thesis includes design of two of these protocols, Hot Standby Router Protocol and Gateway Load Balancing Protocol, and their implementation in discrete event simulator OMNeT++ and Automated Network Simulation and Analysis library. Finally, the thesis presents results of testing of the implementations in comparison with actual Cisco devices.
|
116 |
Simulace chování sítě na základě analýzy konfiguračních souborů aktivních síťových zařízení / Simulation of Network Behaviour Based on Analysis of Configuration of Active Network DevicesMacků, Jiří January 2008 (has links)
This masters thesis describes simulation of network using Network Simulator. Model of network and description of simulation is extracted from the analysis of configuration files of active network devices, and translated by a parser. Concept and implementation of the parser is described here. Because IPv4 addressing is not supported in Network Simulator, it was added as a new module. The Network Simulator is also extended by filtering properties of packets using access control lists. Practical usage of the implemented modules is demonstrated on a simulation of real network.
|
117 |
Architektury systémů na Internetu se skupinovým adresováním / Architectures of Internet-Based Systems with MulticastingVeselý, Vladimír January 2009 (has links)
With rapid expansion of interest in multimedia and distributed computing applications across the Internet increases importance of optimized delivery of group traffic. According to current situation the best practice to achieve this goal is multicasting. This masters thesis summarizes multicasting methods and facts. Also it draws conclusions from practical application of presented information on commercial project.
|
118 |
<b>Leveraging Advanced Large Language Models To Optimize Network Device Configuration</b>Mark Bogdanov (18429435) 24 April 2024 (has links)
<p dir="ltr">Recent advancements in large language models such as ChatGPT and AU Large allow for the effective integration and application of LLMs into network devices such as switches and routers in terms of the ability to play a role in configuration and management. The given devices are an essential part of every network infrastructure, and the nature of physical networking topologies is complex, which leads to the need to ensure optimal network efficiency and security via meticulous and precise configurations.</p><p dir="ltr">The research explores the potential of an AI-driven interface that utilizes AU Large to streamline, enhance, and automate the configuration process of network devices while ensuring that the security of the whole process is guaranteed by running the entire system on-premise. Three core areas are of primary concern in the given study: the effectiveness of integrating the AU Large into network management systems, the impact on efficiency, accuracy, and error rates in network configurations, and the scalability and adaptability to more complex requirements and growing network environments.</p><p dir="ltr">The key performance metrics evaluated are the error rate in the generated configurations, scalability by looking at the performance as more network devices are added, and the ability to generate incredibly complex configurations accurately. The high-level results of the critical performance metrics show an evident correlation between increased device count and increased prompt complexity with a degradation in the performance of the AU Large model from Mistral AI.</p><p dir="ltr">This research has significant potential to alter preset network management practices by applying AI to make network configuration more efficient, reduce the scope for human error, and create an adaptable tool for diverse and complex networking environments. This research contributes to both AI and network management fields by highlighting a path toward the “future of network management.”</p>
|
119 |
En prestanda- och funktionsanalys av Hypervisors för molnbaserade datacenterBard, Robin, Banasik, Simon January 2013 (has links)
I dagens informationssamhälle pågår en växande trend av molnbaserade tjänster. Vid implementering av molnbaserade tjänster används metoden Virtualisering. Denna metod minskar behovet av antal fysiska datorsystem i ett datacenter. Vilket har en positiv miljöpåverkan eftersom energikonsumtionen minskar när hårdvaruresurser kan utnyttjas till sin fulla kapacitet. Molnbaserade tjänster skapar samhällsnytta då nya aktörer utan teknisk bakgrundskunskap snabbt kan komma igång med verksamhetsberoende tjänster. För tillämpning av Virtualisering används en så kallad Hypervisor vars uppgift är att distribuera molnbaserade tjänster. Efter utvärdering av vetenskapliga studier har vi funnit att det finns skillnader i prestanda och funktionalitet mellan olika Hypervisors. Därför väljer vi att göra en prestanda- samt funktionsanalys av Hypervisors som kommer från de största aktörerna på marknaden. Dessa är Microsoft Hyper-V Core Server 2012, Vmware ESXi 5.1.0 och Citrix XenServer 6.1.0 Free edition. Vår uppdragsgivare är försvarsmakten som bekräftade en stor efterfrågan av vår undersökning. Rapporten innefattar en teoretisk grund som beskriver tekniker bakom virtualisering och applicerbara användningsområden. Genomförandet består av två huvudsakliga metoder, en kvalitativ- respektive kvantitativ del. Grunden till den kvantitativa delen utgörs av ett standardsystem som fastställdes utifrån varje Hypervisors begränsningar. På detta standardsystem utfördes prestandatester i form av dataöverföringar med en serie automatiserade testverktyg. Syftet med testverktygen var att simulera datalaster som avsiktligt påverkade CPU och I/O för att avgöra vilka prestandaskillnader som förekommer mellan Hypervisors. Den kvalitativa undersökningen omfattade en utredning av funktionaliteter och begränsningar som varje Hypervisor tillämpar. Med tillämpning av empirisk analys av de kvantitativa mätresultaten kunde vi fastställa orsaken bakom varje Hypervisors prestanda. Resultaten visade att det fanns en korrelation mellan hur väl en Hypervisor presterat och vilken typ av dataöverföring som den utsätts för. Den Hypervisor som uppvisade goda prestandaresultat i samtliga dataöverföringar är ESXi. Resultaten av den kvalitativa undersökningen visade att den Hypervisor som offererade mest funktionalitet och minst begränsningar är Hyper-V. Slutsatsen blev att ett mindre datacenter som inte planerar en expansion bör lämpligtvis välja ESXi. Ett större datacenter som både har behov av funktioner som gynnar molnbaserade tjänster och mer hårdvaruresurser bör välja Hyper-V vid implementation av molntjänster. / A growing trend of cloud-based services can be witnessed in todays information society. To implement cloud-based services a method called virtualization is used. This method reduces the need of physical computer systems in a datacenter and facilitates a sustainable environmental and economical development. Cloud-based services create societal benefits by allowing new operators to quickly launch business-dependent services. Virtualization is applied by a so-called Hypervisor whose task is to distribute cloud-based services. After evaluation of existing scientific studies, we have found that there exists a discernible difference in performance and functionality between different varieties of Hypervisors. We have chosen to perform a functional and performance analysis of Hypervisors from the manufacturers with the largest market share. These are Microsoft Hyper-V Core Server 2012, Vmware ESXi 5.1.0 and Citrix XenServer 6.1.0 Free edition. Our client, the Swedish armed forces, have expressed a great need of the research which we have conducted. The thesis consists of a theoretical base which describes techniques behind virtualization and its applicable fields. Implementation comprises of two main methods, a qualitative and a quantitative research. The basis of the quantitative investigation consists of a standard test system which has been defined by the limitations of each Hypervisor. The system was used for a series of performance tests, where data transfers were initiated and sampled by automated testing tools. The purpose of the testing tools was to simulate workloads which deliberately affected CPU and I/O to determine the performance differences between Hypervisors. The qualitative method comprised of an assessment of functionalities and limitations for each Hypervisor. By using empirical analysis of the quantitative measurements we were able to determine the cause of each Hypervisors performance. The results revealed that there was a correlation between Hypervisor performance and the specific data transfer it was exposed to. The Hypervisor which exhibited good performance results in all data transfers was ESXi. The findings in the qualitative research revealed that the Hypervisor which offered the most functionality and least amount of constraints was Hyper-V. The conclusion of the overall results uncovered that ESXi is most suitable for smaller datacenters which do not intend to expand their operations. However a larger datacenter which is in need of cloud service oriented functionalities and requires greater hardware resources should choose Hyper-V at implementation of cloud-based services.
|
120 |
Automatické testování projektu JavaScript Restrictor / Automatic Testing of JavaScript Restrictor ProjectBednář, Martin January 2020 (has links)
The aim of the thesis was to design, implement and evaluate the results of automatic tests for the JavaScript Restrictor project, which is being developed as a web browser extension. The tests are divided into three levels - unit, integration, and system. The Unit Tests verify the behavior of individual features, the Integration Tests verify the correct wrapping of browser API endpoints, and the System Tests check that the extension does not suppress the desired functionality of web pages. The System Tests are implemented for parallel execution in a distributed environment which has succeeded in achieving an almost directly proportional reduction in time with respect to the number of the tested nodes. The benefit of this work is detection of previously unknown errors in the JavaScript Restrictor extension and provision of the necessary information that allowed to fix some of the detected bugs.
|
Page generated in 0.0402 seconds