Spelling suggestions: "subject:"bnetwork infrastructure"" "subject:"conetwork infrastructure""
11 |
Disruption risk mitigation via optimization and machine learning in rail-truck intermodal transportation of hazardous materialsMoradi Rad, Arash January 2020 (has links)
Random disruptions resulting in loss of functionality in service legs or intermodal terminals of transportation networks are an inevitable part of operations, and considering the crucial role of aforementioned networks, it is prudent to strive towards avoiding high-consequence disruption events. The magnitude of the negative impact of a disruption is dependent on component criticality; therefore, limited resources of disruption mitigation should be assigned to the infrastructure with the highest priority. However, categorizing the service legs and terminals based on their actual post-disruption impact is computationally heavy and inefficient.
We propose a methodology based on the combination of a bi-objective hazmat shipment planning optimization model and machine learning to identify critical infrastructure more efficiently. The proposed methodology is applied to part of CSX Corporation’s intermodal rail-truck network in the United States as a realistic size problem instance, in order to gain managerial insight and to evaluate the performance of the methodology. / Thesis / Master of Science (MSc)
|
12 |
Exploring the Feasibility of a Strategic Alliance Approach to Telecommunications Provision in Rural Municipalitiesvan Gelder, Brenda A. 05 May 2004 (has links)
Rural communities require means for obtaining access to affordable broadband infrastructure and services to meet their economic development, education, and quality of life objectives. Due to the comparatively low potential for return on investment in serving isolated rural communities, the private sector telecommunications providers have proved unwilling or unable to provide beyond the very basic services for rural communities. Private sector providers must maximize their return on investment as it is their responsibility to shareholders. Return on investment is maximized in urban areas as opposed to rural areas because the high capital cost per connection is higher in rural areas; the operating cost per connection is higher; and the revenues per connection tend to be lower. This thesis explores the feasibility of municipal and private sector provider strategic alliances as an approach to provisioning rural areas with improved telecommunications infrastructure and services. As a means of determining whether the possibility exists of a "meeting of the minds" between municipalities and private sector telecommunications providers, a series of interviews was conducted. Common themes from the interviews were analyzed for areas of mutual interest and of polarized perspectives. In pursuing an alliance model, communities may need to consider less than the optimal technological solution in exchange for the opportunity to exemplify the ability to collaborate with a willing private sector partner. The results suggest that, while the prospects for strategic alliances as an emerging business model appear dim, opportunities do exist for rural communities and small private sector companies to find mutual interest on an exceptional basis in developing strategies for access to telecommunications infrastructure and services. / Master of Science
|
13 |
Regionų interneto tinklo infrastruktūros patikimumo tyrimai / Investigation of the regional internet network infrastructure dependabilityRainys, Rytis 06 January 2012 (has links)
Disertacijoje nagrinėjama interneto tinklo infrastruktūros patikimumo problematika, analizei naudojant tinklo topologijos tyrimus, grafų teorijos taikymą ir tinklo modeliavimą. Tyrimų objektas, interneto tinklo infrastruktūra, kurios pagrindą sudaro autonominės sistemos ir tarptinklinių sujungimų linijos. Nuo stabilios interneto tinklo veiklos priklauso informacijos pasiekiamumas, elektroninė komercija, nutolusių objektų valdymas ir t. t. Pagrindinis disertacijos tikslas – sukurti metodikas ir algoritmus, skirtus interneto tinklo infrastruktūros analizei bei veiklos patikimumo kontrolei. Tyrimų taikymo sritis – interneto tinklo veiklos tęstinumo priežiūra ir reguliavimas. Darbe sprendžiami šie pagrindiniai uždaviniai: interneto tinklo topologijos analizės modelio ir priemonių sudarymas; interneto junglumo tyrimas siekiant identifikuoti kritinius elementus, kurių pažeidimai susiję su tinklo funkcionalumo praradimu; kritinių interneto tinklo elementų stebėsenos modelio sudarymas; eksperimentiniai kibernetinių atakų simuliacijos bandymai; bei interneto tinklo infrastruktūros patikimo stiprinimo parinkimas. Disertaciją sudaro įvadas, 5 skyriai, rezultatų apibendrinimas, naudotos literatūros ir autoriaus publikacijų disertacijos tema sąrašai bei priedai. / The dissertation investigates the issues of dependability of the Internet network infrastructure that were studied by using the network topology analysis, graph theory and network modelling. The object of the study is the Internet network infrastructure, based on autonomous systems and interconnecting lines. Stable functioning of the Internet network determines the availability of information, electronic commerce, control of remote objects, etc. The main objective is to develop the methodologies and algorithms for analysing the Internet network infrastructure and controlling the reliability of functioning. The scope of application of the study is the supervision and regulation of continuity of the Internet. The following main tasks are solved: development of the topological scheme of the Internet network, selection of models and tools for analysis; the Internet network connectivity analysis for the purpose of identification of the critical network elements, whose violations would result in loss of connectivity of the network; as well as development of the model for monitoring of the critical elements of the Internet network and cyber-attacks simulation experiments. The scientific work consists of the general characteristic of the dissertation, 5 chapters, conclusions, list of literature, list of publications and annexes.
|
14 |
Investigation of the regional internet network infrastructure dependability / Regionų interneto tinklo infrastruktūros patikimumo tyrimaiRainys, Rytis 06 January 2012 (has links)
The dissertation investigates the issues of dependability of the Internet network infrastructure that were studied by using the network topology analysis, graph theory and network modelling. The object of the study is the Internet network infrastructure, based on autonomous systems and interconnecting lines. Stable functioning of the Internet network determines the availability of information, electronic commerce, control of remote objects, etc. The main objective is to develop the methodologies and algorithms for analysing the Internet network infrastructure and controlling the reliability of functioning. The scope of application of the study is the supervision and regulation of continuity of the Internet. The following main tasks are solved: development of the topological scheme of the Internet network, selection of models and tools for analysis; the Internet network connectivity analysis for the purpose of identification of the critical network elements, whose violations would result in loss of connectivity of the network; as well as development of the model for monitoring of the critical elements of the Internet network and cyber-attacks simulation experiments. The scientific work consists of the general characteristic of the dissertation, 5 chapters, conclusions, list of literature, list of publications and annexes. / Disertacijoje nagrinėjama interneto tinklo infrastruktūros patikimumo problematika, analizei naudojant tinklo topologijos tyrimus, grafų teorijos taikymą ir tinklo modeliavimą. Tyrimų objektas, interneto tinklo infrastruktūra, kurios pagrindą sudaro autonominės sistemos ir tarptinklinių sujungimų linijos. Nuo stabilios interneto tinklo veiklos priklauso informacijos pasiekiamumas, elektroninė komercija, nutolusių objektų valdymas ir t. t. Pagrindinis disertacijos tikslas – sukurti metodikas ir algoritmus, skirtus interneto tinklo infrastruktūros analizei bei veiklos patikimumo kontrolei. Tyrimų taikymo sritis – interneto tinklo veiklos tęstinumo priežiūra ir reguliavimas. Darbe sprendžiami šie pagrindiniai uždaviniai: interneto tinklo topologijos analizės modelio ir priemonių sudarymas; interneto junglumo tyrimas siekiant identifikuoti kritinius elementus, kurių pažeidimai susiję su tinklo funkcionalumo praradimu; kritinių interneto tinklo elementų stebėsenos modelio sudarymas; eksperimentiniai kibernetinių atakų simuliacijos bandymai; bei interneto tinklo infrastruktūros patikimo stiprinimo parinkimas. Disertaciją sudaro įvadas, 5 skyriai, rezultatų apibendrinimas, naudotos literatūros ir autoriaus publikacijų disertacijos tema sąrašai bei priedai.
|
15 |
Metodika zavedení síťové bezpečnosti v softwarové společnosti / Implementation Methodology of Network Security in the Software CompanyTomaga, Jakub January 2013 (has links)
This thesis deals with network security and its deployment in the real environment of the software company. The thesis describes information management framework with a specific concentration on computer networks. Network security policy is designed as well as network infrastructure modifications in order to increase the level of security. All parts of the solution are also analyzed from financial point of view.
|
16 |
Mesh networking in underground mine environments : Exploring security requirements in relation to the performance of mesh networksBerg, Erik, Boudet, Oliver January 2023 (has links)
This study investigates the possibilities of using mesh networking in underground mines. It is of utmost importance to investigate the safety and ethical aspects of implementing new systems in mines, namely mesh networking. Simulations and calculations have been made to analyze and arrive at findings of update intervals for a potential mesh network. Semi-structured interviews have been conducted with responsible staff at underground mine sites, and this study has followed a qualitative approach. Theoretical concepts such as Locatilization infrastructures in underground mines and Personal security and work environment laws in underground mines have been analyzed and discussed in relation to empirical results using thematic analysis. Due to the importance of safety aspects of emergency notifications and real time location tracking, our findings show that mesh networks may not be a viable replacement for a fully connected network in a mine network infrastructure. However, mesh networks or hybrid networks may be a more viable way to improve safety for certain mines that do not have an existing network infrastructure, or as a temporary extension to a fully connected network infrastructure.
|
17 |
Internet das coisas: tecnologias habilitadoras e workflow. / Internet of things: enabling technologies and workflow.Este, Willian Reginato 18 June 2019 (has links)
A Internet das coisas (IoT) é um paradigma consolidado por recentes avanços tecnológicos, que possibilita a identificação e medição de muitas atividades, agregando facilidade, rapidez e eficiência das mesmas, sejam elas realizadas por humanos ou máquinas de, praticamente, qualquer setor que se deseje. Contudo, um dos principais desafios para que soluções de IoT sejam desenvolvidas com sucesso consiste no processo de escolha e integração entre diversas tecnologias que, necessariamente, serão parte de tais soluções. Este estudo tem como objetivo identificar as tecnologias habilitadoras comuns de soluções de IoT por meio da análise qualitativa de diferentes propostas de arquiteturas, que serão as principais fontes para orientar o desenvolvimento de um workflow com macropassos. Delineou-se um conjunto de tarefas que visa auxiliar o processo de escolha de tecnologias para soluções de IoT, sendo apresentado, posteriormente, o uso do workflow aplicado a uma solução para automação, gestão e controle de estufas, através da monitoração de parâmetros vitais para este ambiente. O método utilizado consistiu na busca de fontes bibliográficas constituída por artigos, dissertações e teses via palavras chave, definindo, assim, as questões de pesquisa a que este trabalho busca endereçar. Foram encontrados como resultado 95 trabalhos entre artigos, dissertações e teses e, por critérios de inclusão e exclusão, 76 foram suprimidos, selecionando, assim, o total de 19 trabalhos ao final do processo. A conclusão é de que o workflow mostrou-se apto a apoiar na escolha inicial de tecnologias e desenvolvimento da solução em alto nível, porém apresentou-se insuficiente para detalhamento técnico minucioso da solução. / The Internet of Things (IoT) is a paradigm consolidated by recent technological advances, which enables the identification and measurement of many activities, aggregating their ease, speed and efficiency, whether performed by humans or machines from virtually any sector. However, one of the key challenges for successfully developing IoT solutions is the process of choosing and integrating various technologies that will necessarily be part of such solutions. This study aims to identify the common enabling technologies of IoT solutions through the qualitative analysis of different architecture proposals, which will be the main sources to guide the development of a workflow with macro steps. A set of tasks was designed to assist the process of choosing technologies for IoT solutions, and then the use of workflow applied to a solution for automation, management and control of greenhouses, through the monitoring of vital parameters for this environment. The method used consisted of searching bibliographic sources consisting of articles, dissertations and theses via keywords, thus defining the research questions to which this paper seeks to address. Ninety-five papers were found among articles, dissertations and theses and, by inclusion and exclusion criteria, 76 were deleted, thus selecting a total of 19 papers at the end of the process. The conclusion is that the workflow was able to support the initial choice of technologies and high-level solution development, but was insufficient for thorough technical detailing of the solution.
|
18 |
Návrh řízení informační bezpečnosti v průmyslovém prostředí / Design of information security management in the industrial environmentKadlec, Miroslav January 2018 (has links)
The diploma thesis deals with the design of information security management in the industrial environment. In the first part of thesis is mentioned the theoretical background from the area of information security. The analysis of the default status is followed, and the risk analysis is also performed. Further, the thesis deals with the design of the industrial network infrastructure and its management.
|
19 |
Problematika návrhu síťové infrastruktury / Network infrastructure designTobolka, Lukáš January 2021 (has links)
The aim of this diploma thesis is to look at the design of network infrastructure in practice. There are individual procedures, brands, standards that must be followed when designing. It includes a brief general overview of terminal elements, cable systems and related matters. In general, methods for measuring optical lines and parameters for measuring metallic networks are described here. The possible complications that accompany it are briefly described in the implementation. The network design methodology is also described here on the example of a specific object. Before the actual handover of the work, the entire infrastructure is analyzed and measured with output protocols within the certification of the entire system together with outputs in the form of a measurement protocol.
|
20 |
Návrh ISMS v průmyslovém prostředí / Design of ISMS in Industrial EnvironmentKuchařík, Lukáš January 2016 (has links)
The master’s thesis is aimed at the proposal of network infrastructure and introduction of the managerial system for the safety of information in the industrial environment. At the beginning the work is focused on theoretical knowledge concerning the safety of information wherein it describes basic concepts and common procedures of the managerial system of the safety of information. Further, the work deals with risk analysis in which the measures for reduction in hazard are suggested. The proposal for a new network infrastructure is finally carried out. The work draws the information from CSN standards ISO/IEC, series 27000.
|
Page generated in 0.0684 seconds