• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 6
  • 2
  • 1
  • 1
  • Tagged with
  • 11
  • 11
  • 5
  • 5
  • 4
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Evaluation of monitoring systems and processes

Hedström, Therese, Lundahl, Sara January 2016 (has links)
The focus of this Thesis has been to evaluate different monitoring systems and processes that are used by the Network Operations Center at TDC Sverige AB. The problem formulation involves (i) how the monitoring systems are used, (ii) how these work together, (iii) what processes are involved and (iv) how the systems and processes can be improved to benefit the Network Operations Center. Processes involved in TDC’s work follows the Information Technology Infrastructure Library. To be able to answer the problem formulation, the current documentation is browsed and together with meetings with key figures within the company; such as managers, project managers, technicians and system administrators; information is gathered to give a comprehensive view of the current state of the monitoring systems, and the whole process leading to handover to the Network Operations Center. TDC Network as a Service is a concept that includes different networking solutions in which LAN and WLAN as a Service offers standardized networking solutions for LAN and WLAN. The Network Management System is described, which includes HP Network Node Manager i, Network Performance Servers and incident ticket systems. The process of how incident tickets can be created, both manually and automatically, is described as well as the whole process of how new customers are added to the monitoring and how customers are registered in the different Service Asset and Configuration Management applications. It is discussed how new nodes are added to the monitoring, and which systems are involved in this process, including Network Node Manager i, VisionApp, NetMRI and incident ticket systems. The regular monitoring process of the Network Operations Center is presented in this Thesis. It is suggested that the improvements include involving the Network Operations Center at an earlier stage during the selling and implementation process, and devised a better transition to the Service Operation phase. TDC would benefit from fewer Service Asset and Configuration Management applications and incident ticket systems and there should be better routines regarding documentation.
2

Návrh managementu monitorovacího centra on-line her / Design of Network Management Center for on-line Games

Káčer, Andrej January 2019 (has links)
The thesis focuses on the management and functionality of the Network Operations Center, whose function is to maintain optimal network operations on various platforms, media and communication channels. The department is in a company that develops AAA game titles. The first part defines the theoretical basis. The next section introduces the company together with the analysis of the functioning of the department and communication. The last part is devoted to the design of the organizational structure, which includes the process of creating a new job. The process involves the division of activities, the recruitment process and the economic appreciation itself.
3

Understanding and defending against internet infrastructures supporting cybecrime operations

Konte, Maria 07 January 2016 (has links)
Today's cybercriminals must carefully manage their network resources to evade detection and maintain profitable businesses. For example, a rogue online enterprise has to have multiple technical and business components in place, to provide the necessary infrastructure to keep the business available. Often, cybercriminals in their effort to protect and maintain their valuable network resources (infrastructures), they manipulate two fundamental Internet protocols; the Domain Name System (DNS) and the Border Gateway Protocol (BGP). A popular countermeasure against cybercriminal infrastructures are Autonomous Systems (AS) reputation systems. Past research efforts have developed several AS reputation systems that monitor the traffic for illicit activities. Unfortunately, these systems have severe limitations; (1) they cannot distinguish between malicious and legitimate but abused ASes, and thus it is not clear how to use them in practice, (2) require direct observation of malicious activity, from many different vantage points and for an extended period of time, thus delaying detection. This dissertation presents empirical studies and a system that help to counteract cybecriminal infrastructures. First, we perform empirical studies that help to advance our understanding, about how these infrastructures operate. We study two representative types of infrastructures: (1) fast-flux service networks which are infrastructures based on DNS manipulation, (b) malicious ASes (hubs of cybercriminal activities) which are infrastructures that are primarily based on BGP manipulation. Second, we build on our observations from these studies, and we design and implement, ASwatch; an AS reputation system that, unlike existing approaches, monitors exclusively the routing level behavior of ASes, to expose malicious ASes sooner. We build ASwatch based on the intuition that, in an attempt to evade possible detection and remediation efforts, malicious ASes exhibit agile routing behavior (e.g. short-lived routes, aggressive re-wiring). We evaluate ASwatch on known malicious ASes, and we compare its performance to a state of the art AS reputation system.
4

Performance diagnosis in large operational networks

Mahimkar, Ajay 15 June 2011 (has links)
IP networks have become the unified platform that supports a rice and extremely diverse set of applications and services, including traditional IP data service, Voice over IP (VoIP), smart mobile devices (e.g., iPhone), Internet television (IPTV) and online gaming. Network performance and reliability are critical issues in today's operational networks because many applications place increasingly stringent reliability and performance requirements. Even the smallest network performance degradation could cause significant customer distress. In addition, new network and service features (e.g., MPLS fast re-route capabilities) are continually rolled out across the network to support new applications, improve network performance, and reduce the operational cost. Network operators are challenged with ensuring that network reliability and performance is improved over time even in the face of constant changes, network and service upgrades and recurring faulty behaviors. It is critical to detect, troubleshoot and repair performance degradations in a timely and accurate fashion. This is extremely challenging in large IP networks due to their massive scale, complicated topology, high protocol complexity, and continuously evolving nature through either software or hardware upgrades, configuration changes or traffic engineering. In this dissertation, we first propose a novel infrastructure NICE (Network-wide Information Correlation and Exploration) that enables detection and troubleshooting of chronic network conditions by analyzing statistical correlations across multiple data sources. NICE uses a novel circular permutation test to determine the statistical significance of correlation. It also allows flexible analysis at various spatial granularity (e.g., link, router, network level, etc.). We validate NICE using real measurement data collected at a tier-1 ISP network. The results are quite positive. We then apply NICE to troubleshoot real network issues in the tier-1 ISP network. In all three case studies, NICE successfully uncovers previously unknown chronic network conditions, resulting in improved network operations. Second, we extend NICE to detect and troubleshoot performance problems in IPTV networks. Compared to traditional ISP networks, IPTV distribution network typically adopts a different structure (tree-like multicast as opposed to mesh), imposes more restrictive service constraints (both in reliability and performance), and often faces a much larger scalability issue (managing millions of residential gateways versus thousands of provider-edge routers). Tailoring to the scale and structure of IPTV network, we propose a novel multi-resolution data analysis approach Giza that enables fast detection and localization of regions in the multicast tree hierarchy where the problem becomes significant. Furthermore, we develop several statistical data mining techniques to troubleshoot the identified problems and diagnose their root causes. Validation against operational experiences demonstrates the effectiveness of our approach in detecting important performance issues and identifying interesting dependencies. Finally, we design and implement a novel infrastructure MERCURY for detecting the impact of network upgrades on performance. It is crucial to monitor the network when upgrades are made because they can have a significant impact on network performance and if not monitored may lead to unexpected consequences in operational networks. This can be achieved manually for a small number of devices, but does not scale to large networks with hundreds or thousands of routers and extremely large number of different upgrades made on a regular basis. MERCURY extracts interesting triggers from a large number of network maintenance activities. It then identifies behavior changes in network performance caused by the triggers. It uses statistical rule mining and network configuration to identify commonality across the behavior changes. We systematically evaluate MERCURY using data collected at a large tier-1 ISP network. By comparing to operational practice, we show that MERCURY is able to capture the interesting triggers and behavior changes induced by the triggers. In some cases, MERCURY also discovers previously unknown network behaviors demonstrating the effectiveness in identifying network conditions flying under the radar. / text
5

Protocolos en redes de microcontroladores

López, Ricardo A. January 2010 (has links)
Los microcontroladores están inmersos en nuestra forma de vida. Los encontramos en automóviles, lavarropas, celulares, reproductores MP3, agendas y en un sinfín de sitios en nuestra vida cotidiana. La capacidad de integración a muy alta escala (VLSI) -con crecimiento casi exponencial en los últimos años-, hace que estos dispositivos cada día contengan más y más funciones que antes eran impensadas. Debido a ello, una agrupación de estos dispositivos conectados en red, configura un sistema de control muy poderoso, que dotado de algún protocolo normalizado que permita su interconexión a Internet, le da un alcance prácticamente ilimitado y de gran escalabilidad. Por lo expuesto, en esta tesis se estudiará la implementación de una red de microcontroladores, definiendo funciones de Control y adquisición de datos, equivalentes a los sistemas de Control y Adquisición de Datos (SCADA) de gran escala. Sobre la definición efectuada, surgirá un protocolo de aplicación que permitirá así un desarrollo Top-Down del sistema. Sobre la base de la definición lograda, este primer capítulo describe en un modo general los alcances de la tesis, donde se estudiarán entre otros aspectos, los protocolos de capas de comunicaciones para llegar a dos de las implementaciones más populares utilizadas en los ambientes industriales: RS485 y Ethernet. Si bien la primera es mucho más antigua, sigue aún vigente y se ha potenciado a partir de la creación de interfaces compatibles, citando como ejemplo la inmunidad a ruido eléctrico que le provee una interfase transparente sobre fibra óptica. La segunda, más moderna, ya fija una tendencia debido a su ubicuidad y amplitud de prestaciones.
6

Medición y evaluación de sitios e-banking

Alfonzo, Pedro L. 17 March 2014 (has links)
Los objetivos del trabajo son: - Sintetizar los modelos de calidad y métodos de evaluación orientados a productos web. - Elaborar un método de medición y evaluación, a partir de un modelo de calidad específico para sitios web bancarios, que incluya las características propias del mencionado sector. La propuesta contemplará criterios de evaluación y medición para contribuir al avance de metodologías que permitan evaluar la calidad de productos Web. - Aplicar el método propuesto a un caso concreto.
7

Transforming fleet network operations with collaborative decision support and augmented reality technologies

Fay, John J. 03 1900 (has links)
Approved for public release, distribution is unlimited / Current network administrators use network management software to monitor and control elements within a network. This is largely a manual process since managers must interrogate devices individually and evaluate performance statistics manually. The systems provide multiple views on network data but lack capabilities that allow operators to visualize network performance. Since personnel are required to identify problems, interpret potential solutions, and decide on appropriate corrective measures without automatic assistance, maintaining and solving problems for a network can be time-consuming and complex significantly reducing network efficiency. Since FORCENET is a heterogeneous concept that combines various C4I networks, sensors, weapon systems, and platforms, a new model must be developed for network operations. This paper researches an improved model for fleet network operations management for distributed sea-based forces using existing technologies. Combining a collaborative tool, Decision Support System (DSS), and Augmented Reality (AR) imagery transforms Naval information network management from a "minimum threshold" to an "operations fusion" perspective. Little is known about AR technologies, but the potential exists for virtual network operations centers that can remotely direct networks for sea and shore assets through collaborative efforts. The product of this paper will serve as a baseline for network operations in the network centric environment. / Lieutenant, United States Naval Reserve
8

Designing and implementing a small scale Internet Service Provider

Brown, Johan, Gustafsson Brokås, Alexander, Hurtig, Niklas, Johansson, Tobias January 2009 (has links)
<p>The objective of this thesis is to design and implement a small scaleInternet Service Provider (ISP) for the NetCenter sub department atMälardalen University. The ISP is intended to give NetCenter a networkseparate from the University’s network, providing them with a moreflexible environment for lab purposes. This will give their students anopportunity to experience a larger backbone with Internet accessibility,which has not been previously available. At the same time it will place theteachers in control of the network in the NetCenter lab premises.The network is designed with a layered approach including an Internetaccess layer, a larger core segment and a distribution layer with aseparated lab network. It also incorporates both a public and a privateserver network, housing servers running e.g. Windows Active Directory,external DNS services, monitoring tools and logging applications. TheInternet access is achieved by peering with SUNET providing a full BGPfeed.This thesis report presents methods, implementations and results involvedin successfully creating the NetCenter ISP as both a lab network and anInternet provider with a few inevitable shortcomings; the most prominentbeing an incomplete Windows Domain setup.</p>
9

Designing and implementing a small scale Internet Service Provider

Brown, Johan, Gustafsson Brokås, Alexander, Hurtig, Niklas, Johansson, Tobias January 2009 (has links)
The objective of this thesis is to design and implement a small scaleInternet Service Provider (ISP) for the NetCenter sub department atMälardalen University. The ISP is intended to give NetCenter a networkseparate from the University’s network, providing them with a moreflexible environment for lab purposes. This will give their students anopportunity to experience a larger backbone with Internet accessibility,which has not been previously available. At the same time it will place theteachers in control of the network in the NetCenter lab premises.The network is designed with a layered approach including an Internetaccess layer, a larger core segment and a distribution layer with aseparated lab network. It also incorporates both a public and a privateserver network, housing servers running e.g. Windows Active Directory,external DNS services, monitoring tools and logging applications. TheInternet access is achieved by peering with SUNET providing a full BGPfeed.This thesis report presents methods, implementations and results involvedin successfully creating the NetCenter ISP as both a lab network and anInternet provider with a few inevitable shortcomings; the most prominentbeing an incomplete Windows Domain setup.
10

On monitoring and fault management of next generation networks

Shi, Lei 04 November 2010 (has links)
No description available.

Page generated in 0.1213 seconds