Spelling suggestions: "subject:"bnetwork technology"" "subject:"conetwork technology""
1 |
Improving network extensibility and scalability through SDNRotsos, Charalampos January 2015 (has links)
No description available.
|
2 |
An SDN-based firewall shunt for data-intensive science applicationsMiteff, Simeon January 2016 (has links)
A dissertation submitted to the Faculty of Engineering and the Built Environment, University of the Witwatersrand, Johannesburg, in fulfilment of the requirements for the degree of Master of Science in Engineering, 2016 / Data-intensive research computing requires the capability to transfer les over
long distances at high throughput. Stateful rewalls introduce su cient packet loss
to prevent researchers from fully exploiting high bandwidth-delay network links [25].
To work around this challenge, the science DMZ design [19] trades o stateful packet
ltering capability for loss-free forwarding via an ordinary Ethernet switch. We propose
a novel extension to the science DMZ design, which uses an SDN-based rewall.
This report introduces NFShunt, a rewall based on Linux's Net lter combined
with OpenFlow switching. Implemented as an OpenFlow 1.0 controller coupled to
Net lter's connection tracking, NFShunt allows the bypass-switching policy to be
expressed as part of an iptables rewall rule-set. Our implementation is described
in detail, and latency of the control-plane mechanism is reported. TCP throughput
and packet loss is shown at various round-trip latencies, with comparisons to
pure switching, as well as to a high-end Cisco rewall. Cost, as well as operations
and maintenance aspects, are compared and analysed. The results support reported
observations regarding rewall introduced packet-loss, and indicate that the SDN
design of NFShunt is a technically viable and cost-e ective approach to enhancing
a traditional rewall to meet the performance needs of data-intensive researchers / GS2016
|
3 |
Controller-plane workload characterization and forecasting in software-defined networkingNkosi, Emmanuel January 2017 (has links)
A research report submitted to the Faculty of Engineering and the Built
Environment of the University of the Witwatersrand in partial fulfilment
of the requirements for the degree of
Master of Science in Engineering
February 2017 / Software-defined networking (SDN) is the physical separation of the control and data
planes in networking devices. A logically centralised controller plane which uses a
network-wide view data structure to control several data plane devices is another
defining attribute of SDN. The centralised controllers and the network-wide view data
structure are difficult to scale as the network and the data it carries grow. Solutions
which have been proposed to combat this challenge in SDN lack the use of the statistical
properties of the workload or network traffic seen by SDN controllers. Hence, the
objective of this research is twofold: Firstly, the statistical properties of the controller
workload are investigated. Secondly, Autoregressive Integrated Moving Average Models
(ARIMA) and Artificial Neural Network (ANN) models are investigated to establish
the feasibility of forecasting the controller workload signal. Representations of the state
of the controller plane in the network-wide view in the form of forecasts of the controller
workload will enable control applications to detect dwindling controller resources and
therefore alleviate controller congestion. On the other hand, realistic statistical traffic
models of the controller workload variable are sought for the design and evaluation of
SDN controllers. A data center network prototype is created by making use of an SDN
network emulator called Mininet and an SDN controller called Onos. It was found that
1–2% of flows arrive within 10 s of each other and more than 80% have inter-arrival
times in the range of 10 s–10ms. These inter-arrival times were found to follow a
beta distribution, which is similar to findings made in Machine Type Communications
(MTC). The use of ARIMA and ANN to forecast the controller workload established
that it is feasible to forecast the workload seen by SDN controllers. The accuracy of
these models was found to be comparable for continuously valued time series signals.
The ANN model was found to be applicable even in discretely valued time series data. / MT2017
|
4 |
The impact of inter-company network technology on correlations between supply chain drivers and performance measuresWu, Gang, Mechanical & Manufacturing Engineering, Faculty of Engineering, UNSW January 2009 (has links)
This research aims to examine how, and to what extent, the advanced network technology such as custom-built large-scale network, or internet-based technology contribute to the correlations between supply chain drivers and performance measures. The uniqueness of the research is to use network technology as a leverage factor, instead of merely one of the supply chain drivers, to analyse how it would impact on the correlations between supply chain drivers and performance measures. Through literature review, we identified the key drivers in supply chain and the key performance indicators as independent and dependent variables respectively for data analysis in the research. We consider the utilisation of network technology as a selection variable in the analysis. We also proposed a set of research questions and hypotheses resulting from the literature review. The subsequent data analyses attempted to find answers for these questions and test the validity of the hypotheses. This was achieved by a field survey for 1035 major Australian firms through a structured questionnaire. The response rate of the survey was 20.8%. All these data were analysed with statistical models such as reliability test, multi-collinearity test, MANOVA procedures, factor analysis, and multiple regression modelling to validate whether the survey was robust and how the leverage factor (network technology) would impact on the correlations between supply chain drivers and performance measures. Each research question and hypothesis was reviewed, validated, and concluded based on the results from data analysis. The key findings from the data analysis support the perception that the network technologies with their external customers and suppliers dramatically affect the correlations between supply chain drivers and performance measures. Statistically it actually determines whether the supply chain will success or fail when comparing firms using the technologies with firms not using them. In general, the impact on the correlations is directional and positive. A set of validated theoretical models was also proposed to depict the dynamics between supply chain variables under the influence of network technology. Implications of the findings are also provided in the thesis.
|
5 |
Network configuration and change management software selection for Company XYZMartin, Todd. January 2006 (has links) (PDF)
Thesis, PlanB (M.S.)--University of Wisconsin--Stout, 2006. / Includes bibliographical references.
|
6 |
Data scientist : using a competency based approach to explore an emerging roleNosarka, Naseema Banu January 2018 (has links)
A research report submitted in partial fulfilment to the Degree of Master of Commerce (Information Systems) in the school of Economic and Business Sciences, University of the Witwatersrand, 2018 / Purpose: The aim in this research study was to explore the role and competencies of Data Scientists in South Africa as the role starts to emerge. Due to the newness of the role, jobs in this sphere are currently being filled by skilled professionals moving from other related areas. Knowledge and skills for Data Scientists were explored in order to examine the role of a Data Scientist and the competencies they should have.
Design/methodology/approach: The studies that have been published on the role of a Data Scientist are limited as the field of Data Science is still new. Therefore the design of the research was exploratory and used qualitative methods. Data gathered for this research was analysed using thematic analysis. The study used respondents drawn from the banking and insurance industries as they are amongst the first to employ Data Scientists in the real sense of the term in South Africa. Six Data Scientists were interviewed.
Originality/value: Research that focuses on the role of Data Scientists especially in South Africa is limited as most of the research has taken place in developed countries. There is also limited research on the role of a Data Scientist within the banking and insurance industry. This study contributes to practitioner and research knowledge by exploring the emerging role of a Data Scientist in the South African context.
Practical implications: This research improves our understanding of the knowledge and skills Data Scientists should have within the banking and insurance industry. This research adds insight by highlighting the role that Data Scientists are currently undertaking by providing information on the specific skills that they report as required. This research can help in the shaping of education and developing the required skills for individuals who intend to pursue the career path of a Data Scientist as well as help managers hire the right people for the position of a Data Scientist. / TL2019
|
7 |
Design of a generic client-server messaging interface using XMLRimer, Suvendi Chinnappen 21 September 2005 (has links)
Applications that use directory services or relational databases operate in client-server mode where a client requests information from a server, and the server returns a response to the client. Communication between each client-server application is achieved by using separate custom built front-ends with non-portable data formats. A need exists to access information from different heterogeneous client-server systems in a standard message request-response format. This research proposes a generic XML document that presents a common request-response interface to the client from which they can access network protocol or database information. The XML component is easily adaptable to accessing any new client-server type protocol or database data that may be added to a server. The approach in determining the XML elements is, firstly review each systems command and data structure separately, and then determine if there are any commonalities within each protocol that would allow for a common representation of both the data and command structure. For the purposes of this project, three different data sources that are typically used in an Internet application were analysed, namely: -- a TCP based server program; -- a relational type database; and -- a directory service. The solution was implemented using Linux as the operating system, Java as the programming language, MySQL as the relational database, openLDAP as the directory server and a proprietary TCP based server application. Initially the complete system was developed for the proprietary TCP-based application. The other systems were added with minimum additional work. The result of the implementation was that it is relatively easy to add new protocols (for e.g. LDAP) on an as needed basis with minimal changes required on the server side. A client will receive XML responses that the client can either adapt (typically using a separate style-sheet) to their specific needs or use the existing front-ends if they are suitable. After the design was implemented and tested, the performance of XML and non-XML messages was evaluated. As expected the increased verbosity of XML results in a larger footprint that requires more processing time and resources. This means that any implementation using XML has to carefully weight the benefits of flexibility, extensibility and standard message formats against reduced performance. After evaluating XML type messages in an Internet type environment that involved human-computer interaction, it was concluded that the slower response times is not that significant to negate the benefits of a common message interface provided by using XML. / Dissertation (M Eng (Computer Engineering))--University of Pretoria, 2006. / Electrical, Electronic and Computer Engineering / unrestricted
|
8 |
Adjacent Channel Interference Criteria for Aeronautical Telemetry Operations with the Tactical Targeting Network Technology SystemTemple, Kip 10 1900 (has links)
ITC/USA 2009 Conference Proceedings / The Forty-Fifth Annual International Telemetering Conference and Technical Exhibition / October 26-29, 2009 / Riviera Hotel & Convention Center, Las Vegas, Nevada / This paper will provide recommended channel spacing requirements when the Tactical Targeting Network Technology (TTNT) System is utilized in conjunction with airborne telemetry systems at airborne test ranges. The recommendation will be in the form of an equation similar in form to the adjacent channel interference (ACI) equation currently in the Telemetry Standard IRIG-106. Test results will be presented to support this recommendation.
|
9 |
Utilizing a Game Theoretical Approach to Prevent Collusion and Incentivize Cooperation in Cybersecurity ContextsUnknown Date (has links)
In this research, a new reputation-based model is utilized to disincentivize collusion
of defenders and attackers in Software Defined Networks (SDN), and also, to disincentivize
dishonest mining strategies in Blockchain. In the context of SDN, the model uses the
reputation values assigned to each entity to disincentivize collusion with an attacker. Our
analysis shows that not-colluding actions become Nash Equilibrium using the reputationbased
model within a repeated game setting. In the context of Blockchain and mining,
we illustrate that by using the same socio-rational model, miners not only are incentivized
to conduct honest mining but also disincentivized to commit to any malicious activities
against other mining pools. We therefore show that honest mining strategies become Nash
Equilibrium in our setting.
This thesis is laid out in the following manner. In chapter 2 an introduction to
game theory is provided followed by a survey of previous works in game theoretic network
security, in chapter 3 a new reputation-based model is introduced to be used within the
context of a Software Defined Network (SDN), in chapter 4 a reputation-based solution
concept is introduced to force cooperation by each mining entity in Blockchain, and finally,
in chapter 5, the concluding remarks and future works are presented. / Includes bibliography. / Thesis (M.S.)--Florida Atlantic University, 2017. / FAU Electronic Theses and Dissertations Collection
|
10 |
FAR : an end-user language to support cottage e-servicesChekka, Sudheer Kumar 16 July 2001 (has links)
E-commerce has begun to evolve beyond simple web pages to more
sophisticated ways of conducting e-business transactions, such as through electronic
advertising, negotiation, and delivery. However, to participate in these advances
requires the skills of professional programmers, and end-user owners of small
businesses often cannot justify this expense. In this thesis, we present FAR, an end-user
language to offer and deliver e-services. The novel aspects of FAR are its support
of small e-services and its multiparadigm approach to combining ideas from
spreadsheets and rule-based programming with drag-and-drop web page layout
devices. / Graduation date: 2002
|
Page generated in 0.066 seconds