• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 30
  • 30
  • 26
  • 8
  • 5
  • 5
  • 3
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 122
  • 28
  • 27
  • 23
  • 20
  • 18
  • 12
  • 12
  • 11
  • 10
  • 9
  • 9
  • 9
  • 9
  • 9
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
71

Klassenbasierter Anschluss im Chemnitzer Studenten Netz

Junge, Sebastian 10 December 2005 (has links)
Im Rahmen dieser Studienarbeit soll die Bedeutung klassenbasierter Anschlüsse im Chemnitzer Studenten Netz untersucht und Tools bereitgestellt werden, welche eine weitgehend automatisierte Anlage/Verwaltung solcher Netzklassen ermöglichen.
72

Automatisera konfigurationen av routrar och switchar på ett IT-tjänsteföretag

Boularbah, Mohamed January 2020 (has links)
Det anonyma företaget är ett IT-tjänsteföretag som utför IT-tjänster efter kunds behov. De fick för några månader sedan en internetleverantör som kund. De sköter konfigurationen av internetleverantörens routrar och switchar som sen skickas till internetleverantörens företagskunder. Arbetet går ut pa att uppgradera operativsystem på routrar och switchar samt lägga till filer och sedan skicka produkt till internetleverantörens slutkund. Filer och operativsystem skiljer sig åt beroende på vilken typ av router och switch som ska uppgraderas. Arbetssättet idag är ineffektivt och det blir en del fel då man idag arbetar med USB minnen. Målet med detta arbete är att effektivisera deras arbetssätt genom att lagra alla filer på en TFTP server istället för på USB minnen. Ett skript ska skapas med språket VB script som automatiserar konfigurationen av routrar och switchar. Terminal för att kunna kommunicera med router/switch är SecureCrt. Personal på Företaget har sagt att det i snitt tar ca 15 minuter att konfigurera en router manuellt. Man kör endast en åt gången pga. kvalitetssäkring och man måste sitta framför skärmen under hela förloppet då man konfigurerar manuellt. Resultatet av mitt arbete ledde till en effektivisering. Tiden det tar att konfigurera en router hamnar pa samma tid, ca 15 minuter, dock kan man köra flera samtidigt men pga. platsbrist så kan de köra max två åt gången samtidigt som man inte behöver sitta framför skärmen då skriptet sköter all konfiguration. Det blev också säkrare att köra då man slipper leta efter rätt USB minne till motsvarande enhet. / The anonymous company is an IT company that performs IT services according to customer needs. They got an internet provider as a customer about a couple of months ago. They manage the configuration of the ISP's routers and switches, which are then sent to the ISP's corporate customers. The work involves upgrading operating systems on routers and switches as well as adding files and then sending the product to the ISP’s end customer. Files and operating systems differ depending on the type of router and switch to be upgraded. The working method today is inefficient and there can be some errors when working with USB memory sticks today. The goal of this work is to improve and make their operation more effective by storing all files on a TFTP server instead of on USB storage. A script will be created with the language VB script that automates the configuration of routers and switches. The terminal for communicating with the router/switch is SecureCrt. Staff at the company have said that it takes on average about 15 minutes to manually configure a router. You only configure one at a time due to quality assurance and you have to sit in front of the screen throughout the process when configuring manually. The result of my work led to an efficiency improvement. The time it takes to configure a router ends at the same time, about 15 minutes, however, you can run several units simultaneously but because of lack of space, they can run a maximum of two at a time, while not having to sit in front of the screen as the script handles all configuration. It also led to lesser errors as you do not have to look for the correct USB memory for the corresponding device.
73

Byte av switchar i datornätverk, planering och genomförande / Replacing Computer Network Switches, Planning and Implementation

Tidemar, Mikael January 2013 (has links)
Xylem Water Solutions AB är en stor del av Xylem Inc. som har totalt ca 12000 anställda i hela världen, Xylem Water Solutions AB huvudkontor i Sundbyberg har ca 400 anställda och ca 50 servrar i en serverhall. Målet med examensarbetet är att som projektledare utföra en förstudie, planera samt genomföra ett switchbyte i en blandad klient och servermiljö med flera huvudmål: Att minska befintlig offertkostnad, minska det dagliga underhållet, se till att de nätverkskopplingar som används verkligen används, säkra upp redundans för både server- och klientnätverkskopplingarna, se till att dagens och framtidens krav för klientsidan samt serverhallen uppfylls på huvudkontoret för Xylem Water Solutions AB i Sundbyberg. Under projektets gång formades en plan och den följdes sedan till att byta från Nortelprodukter till ett nytt, stabilt nätverk uppbyggt av Ciscoprodukter, Nexus 5548P och 2248 för core/serveraccess-switchar och Catalyst C2960S-switchar för klientaccess. / Xylem Water Solutions is a large part of Xylem Inc. which has approximately 12000 employees globally; Xylem Water Solutions headquarters in Sundbyberg, Sweden has around 400 employees and approximately 50 servers in a small server room. The goal of this thesis work is to; as a project manager do a pilot study, plan and execute a switch replacement in a mixed client and server environment with many goals: To reduce the existing planned network solution cost, to reduce daily maintenance, verify the number of outlets actually used, to make sure that redundancy is applied to all server and client network connections, to make sure to adhere to the demands today as well as in the future for the client and server network connection needs at the headquarters of Xylem Water Solutions in Sundbyberg, Sweden. During the project, a plan was made and ultimately followed (with some exceptions due to lack of time and resources) to change from Nortel products to a new and stable network comprised of Cisco products; Nexus 5548P and 2248 as core/server access switches and Catalyst C2960S as client access switches.
74

Sårbarheter i routrar och switchar

Dannerud, Sara January 2008 (has links)
Det finns många olika källor där man kan få information om sårbarheter i routrar och switchar. Mängden information gör det dock svårt att på ett enkelt sätt ta reda på vilka tillverkare som drabbas och vilken typ av sårbarheter man hittar i nätverksutrustning. Därmed är det också svårt att veta hur man ska skydda sin utrustning mot attacker. I detta examensarbete analyseras ett antal befintliga sårbarheter i routrar och switchar. Dessa sårbarheter har valts ut genom att i National Vulnerability Database söka på orden ”router” och ”switch”. Målet med analysen är att svara på frågorna vem, vad och varför när det gäller sårbarheter i routrar och switchar. Examensarbetet beskriver vilka tillverkare som drabbas av sårbarheter, vilka typer av sårbarheter som är vanligast i routrar och switchar och varför sårbarheterna har uppstått. Utifrån detta dras slutsatser om vad man som användare ska göra för att undvika attacker mot sin utrustning. I arbetet beskrivs också hur tillverkarna väljer att hantera de sårbarheter som finns i deras produkter. / There are a lot of different sources to information about vulnerabilities in routers and switches. The amount of information means that there is no easy way to find out which vendors are affected by vulnerabilities and what types of vulnerabilities that are found in network equipment. Thereby it is also hard to know how to protect your equipment against attacks. In this thesis a number of already existing vulnerabilities in router and switches are being analyzed. These vulnerabilities have been chosen by searching the National Vulnerability Database using the words “router” and “switch”. The aim of the analysis is to answer the questions who, what and why when it comes to vulnerabilities in routers and switches. The thesis describes which vendors are exposed to vulnerabilities, what types of vulnerabilities that are most common among routers and switches and why these vulnerabilities have came up. Based on this information, conclusions are drawn regarding what the user should do to avoid vulnerabilities in their equipment. The way the companies deal with vulnerabilities in their products is also described.
75

Aspects of the Feeding Ecology of the Bonneville Cisco of Bear Lake, Utah-Idaho

Lentz, David C. 01 May 1986 (has links)
The Bonneville cisco (Prosopium gemmiferum), a small planktivorous whitefish, is an important part of the distinctive fish community of Bear Lake, Utah-Idaho. The Bonneville cisco plays a key role in the trophic structure by converting zooplankton to fish biomass and providing a major forage sour ce for cutthroat and lake trout. Aspects of cisco feeding ecology studied include characterization of the zooplankton community composition and dynamics and cisco feeding habits and prey select ion.
76

The Effects of Gully Plugs and Contour Furrows on Erosion and Sedimentation in Cisco Basin, Utah

Thomas, Dee B. 01 May 1975 (has links)
Soil surface treatments consisting of gully plugs and contour furrows were constructed as a means of reducing erosion and holding sediment on site. To measure the effectiveness of the gully plugs and furrows, angle iron stakes and profile transects were installed to measure soils loss and accompanying change in the soil profile. The profile transects gave a reliable measure of the change in the height of the soil surface in constructed pits and across contour furrows. Because of the shrinking and swelling of the soil, the change in height of the angle iron stakes was found to be much more than the reduction in soil surface caused by erosion. High intensity thunderstorms, occuring mostly during July, August, and September, cause most of the erosion from the semi-arid land. The gully plugs and contour furrows were effective in holding runoff and sediment on site, but the life expectancy of the treatments is only about fifteen years.
77

Mobile IP v sítích MANET / Mobile IP in MANETs

Raška, Martin January 2009 (has links)
This thesis discuss about the problem with mobility of stations in IP networks, concretely protocol Mobile IP and about the problems with this protocol in MANET networks, with the scope on Motorola MESH. First part is about design integration of protocol Mobile IP in this networks with usage Tropos 5210 MetroMesh routers and Cisco components (router, switch) to design and configure wireless MESH network, than connect this network with Cisco components and try to implement Mobile IP into this network. Second part is about design and configure wireless network from Cisco Wireless Access Points and about succesfully implementation of Mobile IP protocol into this network. In the last part is some tests of the function and quality of this topology.
78

Analysis, Implementation and Enhancement of Vendor dependent and independent Layer-2 Network Topology Discovery / Analyse, Implementierung und Verbesserung von Hersteller abhängigem und unabhängigem Layer-2 Netzwerk Topologie Erkennung

Barthel, Alexander 26 May 2005 (has links) (PDF)
This work shows and implements possibilities of OSI Layer-2 Network Topology Discovery based on information from Cisco Discovery Protocol, Spanning Tree Protocol and Switches' Filtering Databases. / Diese Arbeit zeigt und implementiert Möglichkeiten zur OSI Layer-2 Netzwerk Topologie Erkennung basierend auf Informationen des Cisco Discovery Protocol, Spanning Tree Protocol und Switch Filter Datenbanken.
79

Wertorientierte Netzwerksteuerung : neue Werttreiber für Unternehmen in Wertschöpfungsnetzen /

Laupper, Urban Anton Karl. January 2004 (has links) (PDF)
Univ., Diss.--St. Gallen, 2004.
80

Analysis, Implementation and Enhancement of Vendor dependent and independent Layer-2 Network Topology Discovery

Barthel, Alexander 15 April 2005 (has links)
This work shows and implements possibilities of OSI Layer-2 Network Topology Discovery based on information from Cisco Discovery Protocol, Spanning Tree Protocol and Switches' Filtering Databases. / Diese Arbeit zeigt und implementiert Möglichkeiten zur OSI Layer-2 Netzwerk Topologie Erkennung basierend auf Informationen des Cisco Discovery Protocol, Spanning Tree Protocol und Switch Filter Datenbanken.

Page generated in 0.0425 seconds