• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 37
  • 9
  • 8
  • 6
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • Tagged with
  • 67
  • 67
  • 67
  • 21
  • 15
  • 14
  • 12
  • 10
  • 10
  • 10
  • 9
  • 8
  • 8
  • 8
  • 7
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
31

Correlation and comparative analysis of traffic across five network telescopes

Nkhumeleni, Thizwilondi Moses January 2014 (has links)
Monitoring unused IP address space by using network telescopes provides a favourable environment for researchers to study and detect malware, worms, denial of service and scanning activities. Research in the field of network telescopes has progressed over the past decade resulting in the development of an increased number of overlapping datasets. Rhodes University's network of telescope sensors has continued to grow with additional network telescopes being brought online. At the time of writing, Rhodes University has a distributed network of five relatively small /24 network telescopes. With five network telescope sensors, this research focuses on comparative and correlation analysis of traffic activity across the network of telescope sensors. To aid summarisation and visualisation techniques, time series' representing time-based traffic activity, are constructed. By employing an iterative experimental process of captured traffic, two natural categories of the five network telescopes are presented. Using the cross- and auto-correlation methods of time series analysis, moderate correlation of traffic activity was achieved between telescope sensors in each category. Weak to moderate correlation was calculated when comparing category A and category B network telescopes' datasets. Results were significantly improved by studying TCP traffic separately. Moderate to strong correlation coefficients in each category were calculated when using TCP traffic only. UDP traffic analysis showed weaker correlation between sensors, however the uniformity of ICMP traffic showed correlation of traffic activity across all sensors. The results confirmed the visual observation of traffic relativity in telescope sensors within the same category and quantitatively analysed the correlation of network telescopes' traffic activity.
32

Novel approaches to the monitoring of computer networks

Halse, G A January 2003 (has links)
Traditional network monitoring techniques suffer from a number of limitations. They are usually designed to solve the most general case, and as a result often fall short of expectation. This project sets out to provide the network administrator with a set of alternative tools to solve specific, but common, problems. It uses the network at Rhodes University as a case study and addresses a number of issues that arise on this network. Four problematic areas are identified within this network: the automatic determination of network topology and layout, the tracking of network growth, the determination of the physical and logical locations of hosts on the network, and the need for intelligent fault reporting systems. These areas are chosen because other network monitoring techniques have failed to adequately address these problems, and because they present problems that are common across a large number of networks. Each area is examined separately and a solution is sought for each of the problems identified. As a result, a set of tools is developed to solve these problems using a number of novel network monitoring techniques. These tools are designed to be as portable as possible so as not to limit their use to the case study network. Their use within Rhodes, as well as their applicability to other situations is discussed. In all cases, any limitations and shortfalls in the approaches that were employed are examined.
33

Bandwidth management and monitoring for IP network traffic : an investigation

Irwin, Barry Vivian William January 2001 (has links)
Bandwidth management is a topic which is often discussed, but on which relatively little work has been done with regard to compiling a comprehensive set of techniques and methods for managing traffic on a network. What work has been done has concentrated on higher end networks, rather than the low bandwidth links which are commonly available in South Africa and other areas outside the United States. With more organisations increasingly making use of the Internet on a daily basis, the demand for bandwidth is outstripping the ability of providers to upgrade their infrastructure. This resource is therefore in need of management. In addition, for Internet access to become economically viable for widespread use by schools, NGOs and other academic institutions, the associated costs need to be controlled. Bandwidth management not only impacts on direct cost control, but encompasses the process of engineering a network and network resources in order to ensure the provision of as optimal a service as possible. Included in this is the provision of user education. Software has been developed for the implementation of traffic quotas, dynamic firewalling and visualisation. The research investigates various methods for monitoring and management of IP traffic with particular applicability to low bandwidth links. Several forms of visualisation for the analysis of historical and near-realtime traffic data are also discussed, including the use of three-dimensional landscapes. A number of bandwidth management practices are proposed, and the advantages of their combination, and complementary use are highlighted. By implementing these suggested policies, a holistic approach can be taken to the issue of bandwidth management on Internet links.
34

The impact of cloud computing on the role of an IT department : a case study of a higher education institution in the Western Cape

Toutcha, N'souh Yonkwa January 2017 (has links)
Thesis (MTech (Business Administration))--Cape Peninsula University of Technology, 2017. / Information and communication technologies are moving fast. Consequently, organisations must be aware of this evolution and adapt to take full advantage of the benefits offered by these technologies. Cloud computing is a new concept of accessing data centers and various computing resources via the internet through any devices and from anywhere. Large organizations, such as Higher Education Institutions (HEI), are gradually adopting cloud computing to reduce their very high budgets. In emerging countries, more and more HEIs are adopting the services offered by cloud computing, more precisely in South Africa in the Western Cape. However, cloud computing affects the way IT services are delivered by traditional HEI IT departments. Thus the objective of this study is to explore the impact of cloud computing on the role of the IT department of HEIs, using a case study. To fulfil this objective, interviews were conducted within the IT department of an HEI, including the IT staff, and it was found that cloud computing affects the role of the IT department by changing the roles and responsibilities of some IT staff, as well as the focus of certain posts in the department. In addition, cloud computing also affects the department's culture. Fortunately, no IT staff have lost their posts. Other results show that training and certification were necessary for the IT to adapt to the changes. Cloud computing adds value to the IT department because it offers a daily 24-hour service as opposed to the traditional IT department.
35

Uma abordagem para reserva de recursos no gerenciamento de QoS entre dominios em redes de proxima geração / An approach to inter-domain resource reservation for QoS management in next generation networks

Freitas, Ricardo Batista 14 August 2018 (has links)
Orientador: Edmundo Roberto Mauro Madeira / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-14T04:15:26Z (GMT). No. of bitstreams: 1 Freitas_RicardoBatista.pdf: 1724833 bytes, checksum: ed34480e6446ddb4976ca277d8073c3c (MD5) Previous issue date: 2009 / Resumo: A evolução tecnológica ocorrida nas últimas décadas proporcionou o acentuado crescimento da Internet, o surgimento de novos dispositivos capazes de conectarem-se a ela, como sensores e PDAs, e a criação de uma multitude de aplicações online. Esse novo cenário trouxe desafios muito distantes dos inicialmente considerados na criação da Internet, surgindo assim a necessidade de novas arquiteturas para atendê-los genuinamente: as Redes de Próxima Geração (Next Generation Networks (NGNs)). Com a crescente facilidade de acesso, a Internet tem ganhado uma importância cada vez maior na vida cotidiana e atividades como transações bancárias, jogos online e videoconferências têm demandado cada vez mais segurança, rapidez e largura de banda. Para assegurar essas características nas NGNs, o gerenciamento da qualidade de serviço (Quality of Service (QoS)) é essencial e terá que enfrentar grandes desafios como mobilidade, heterogeneidade de tecnologia e autonomia de nós e domínios. Visando abordar esse desafio, este trabalho apresenta uma estratégia para reserva de recursos no gerenciamento de QoS inter-domínios em Redes de Próxima Geração. Essa estratégia leva em conta a alta mobilidade esperada nas NGNs e propõe a reutilização de reservas para acelerar o restabelecimento da QoS após movimentações de nós ou redes. Para a implementação dessa estratégia, optou-se pela adaptação do Virtual Topology Service, o qual é um serviço que permite aos domínios divulgarem informações de QoS, através de topologias virtuais, e negociarem reservas de recursos independentemente da tecnologia que utilizar~ao para concretizar essas reservas. A estratégia proposta e sua implementação foram testadas em diferentes cenários de mobilidade em um protótipo de NGN real. A análise dos resultados dos testes mostrou que o reuso de reservas acelera a reserva de novos recursos e, consequentemente, o restabelecimento da qualidade de serviço esperada pelo usuário / Abstract: The technological evolution that happened on the last decades fostered the steep growth of the Internet, the creation of new Internet capable devices, like sensors and PDAs, and the creation of a multitude of online applications. This new scenario brought challenges very different from those initially considered on the creation of the Internet, so emerged the need for new architectures that genuinely address them: the Next Generation Networks (NGNs). With continuously easier access, the Internet is becoming extremely important to our daily lives and activities like banking transactions, online games and videoconference are demanding more security, speed and bandwidth. In order to ensure these characteristics in NGNs, the quality of service (QOS) management is essential and will have to face great challenges like mobility, technology heterogeneity, and domain and node autonomy. Aiming to address these challenges, this work presents a strategy for resource reservation in inter-domain QoS management in Next Generation Networks. This strategy takes into account the high mobility expected in NGNs and proposes the reuse of reservations to speed up the QoS reestablishment after node or network movements. For the implementation of this strategy, we decided to adapt the Virtual Topology Service, which is a service that helps the domains to advertise QoS information, through virtual topologies, and to negotiate resource reservations independently from the technology they will use to enforce these reservations. The proposed strategy and its implementation were tested in different mobility scenarios over a real NGN prototype. The analysis of the test results showed that the reservation reuse accelerates the reservation of new resources and, consequently, the reestablishment of the QoS expected by the user / Universidade Estadual de Campi / Ciência da Computação / Mestre em Ciência da Computação
36

Uma abordagem cognitiva para auto-configuração de protocolos de comunicação / A cognitive approach to self-configuration of communication protocols

Malheiros, Neumar Costa, 1981- 23 August 2018 (has links)
Orientador: Edmundo Roberto Mauro Madeira, Nelson Luis Saldanha da Fonseca / Tese (doutorado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-23T03:41:55Z (GMT). No. of bitstreams: 1 Malheiros_NeumarCosta_D.pdf: 3612194 bytes, checksum: e5c84ef5d3c3f025b775cde399720ea6 (MD5) Previous issue date: 2013 / Resumo: À medida que novas tecnologias de rede são desenvolvidas, torna-se mais complexa a tarefa de gerenciar os serviços e protocolos de comunicação. Diante de tal complexidade, a gerência das redes de comunicação atuais representa um grande desafio. As soluções de gerência tradicionais, com uma arquitetura centralizada, não apresentam um alto grau de escalabilidade e não são capazes de prover reconfiguração dinâmica dos protocolos de comunicação em reposta às constantes mudanças nas condições da rede. Neste trabalho, apresenta-se uma solução factível e eficaz para auto-configuração de protocolos de comunicação. Propõe-se uma abordagem cognitiva para a reconfiguração dinâmica de parâmetros de protocolos a fim de evitar a degradação de desempenho resultante de eventuais alterações nas condições da rede. O arcabouço proposto, denominado CogProt, provê, através de mecanismos de aprendizagem e decisão, o ajuste de parâmetros dos protocolos durante a operação da rede. Parâmetros de interesse são periodicamente reconfigurados de acordo com informações de monitoramento a fim de aumentar o desempenho médio do sistema como um todo. A abordagem proposta é descentralizada e pode ser aplicada no ajuste dinâmico de uma ampla variedade de protocolos em diferentes camadas da arquitetura da rede. Apresenta-se uma série de estudos de caso para ilustrar a aplicação da abordagem proposta. Estudos baseados em simulação e um experimento em um ambiente de rede real foram realizados para avaliar o desempenho do arcabouço CogProt. Os resultados demonstram a eficácia da abordagem proposta em reagir prontamente às mudanças no estado da rede e melhorar o desempenho médio dos protocolos / Abstract: As network technologies evolve, the complexity of managing communication infrastructures and protocols increases. Such complexity makes the management of current communication networks a major challenge. Traditional centralized solutions for network management are not scalable and are incapable of providing continuous reconfiguration of network protocols in response to time-varying conditions. In this work, we present a feasible and effective solution for self-configuration of communication protocols. We propose a cognitive approach for dynamic reconfiguration of protocol parameters in order to avoid performance degradation as a consequence of changing network conditions. The proposed cognitive framework, called CogProt, provides runtime adjustment of protocol parameters through learning and reasoning mechanisms. It periodically reconfigures the parameters of interest based on acquired knowledge to improve system-wide performance. The proposed approach is decentralized and can be applied to runtime adjustment of a wide range of protocol parameters at different layers of the protocol stack. We present a number of case studies to illustrate the application of the proposed approach. Both simulation and wide-area network experiments were performed to evaluate the performance of the proposed approach. Results demonstrate the effectiveness of the proposed approach to improve overall performance for different network scenarios and also to avoid performance degradation by timely reacting to network changes / Doutorado / Ciência da Computação / Doutor em Ciência da Computação
37

Inferindo a fonte e o destino do tráfego anômalo em redes de computadores usando correlação espaço-temporal / Inferring the source and destination of the anomalous traffic in networks using spatio-temporal correlation

Amaral, Alexandre de Aguiar, 1986- 19 August 2018 (has links)
Orientadores: Leonardo de Souza Mendes, Mario Lemes Proença Junior / Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-19T02:04:03Z (GMT). No. of bitstreams: 1 Amaral_AlexandredeAguiar_M.pdf: 2806398 bytes, checksum: 8a624028da0fcad69cc19e194d5e788c (MD5) Previous issue date: 2011 / Resumo: Estratégias voltadas para a detecção de anomalias em redes de computadores emitem alarmes como forma de notificação ao administrador de rede. Esses alarmes são essenciais para a gerencia de rede, pois são evidencias de uma anormalidade. Entretanto, uma única anomalia pode gerar um numero excessivo de alarmes, tornando a inspeção manual inviável. Nesta dissertação, e apresentado um sistema de correlação de alarmes automatizado, divido em três camadas, que obtém os alarmes primitivos e apresenta ao administrador de rede uma visão global do cenário afetado pela anomalia. A camada de pré-processamento faz a compressão dos alarmes utilizando seus atributos espaciais e temporais, os quais são reduzidos a um único alarme denominado DLA (Alarme em Nível de Equipamento). A camada de correlação busca, através dos DLAs e de informações sobre a topologia da rede, inferir o caminho de propagação da anomalia, sua origem e destino. A camada de apresentação prove a visualização do caminho e elementos de redes afetados pela propagação da anomalia. O sistema apresentado nesta dissertação foi aplicado em diversos cenários que apresentavam anomalias reais detectadas na rede da Universidade Estadual de Londrina. Foi demonstrada sua capacidade de identificar, de forma automatizada, o caminho de propagação do trafego anômalo, proporcionando informações úteis e corretas ao administrador de rede para o diagnostico do problema / Abstract: Anomaly detection systems for computer networks send alarms in order to notify the network administrator. These alarms are essential for network management because they are evidences of an abnormality. However, a single anomaly may generate an excessive volume of alarms, making the manual inspection unfeasible. In this work, it is presented an automated alarm correlation system divided into three layers, which obtains raw alarms and presents to network administrator a global view of the scenario affected by the anomaly. In the preprocessing layer, it is performed the alarm compression using their spatial and temporal attributes, which are reduced to a unique alarm named DLA (Device Level Alarm). The correlation layer aims to infer the anomaly propagation path and its origin and destination using DLAs and network topology information. The presentation layer provides the visualization of the path and network elements affected by the anomaly propagation through the network. The presented system was applied in various scenarios that had real anomalies detected on the State University of Londrina network. It demonstrated its ability to identify in an automated manner the anomalous traffic propagation path, providing useful and accurate information to the network administrator to diagnose the problem / Mestrado / Telecomunicações e Telemática / Mestre em Engenharia Elétrica
38

An investigation of protocol command translation as a means to enable interoperability between networked audio devices

Igumbor, Osedum Peter January 2014 (has links)
Digital audio networks allow multiple channels of audio to be streamed between devices. This eliminates the need for many different cables to route audio between devices. An added advantage of digital audio networks is the ability to configure and control the networked devices from a common control point. Common control of networked devices enables a sound engineer to establish and destroy audio stream connections between networked devices that are distances apart. On a digital audio network, an audio transport technology enables the exchange of data streams. Typically, an audio transport technology is capable of transporting both control messages and audio data streams. There exist a number of audio transport technologies. Some of these technologies implement data transport by exchanging OSI/ISO layer 2 data frames, while others transport data within OSI/ISO layer 3 packets. There are some approaches to achieving interoperability between devices that utilize different audio transport technologies. A digital audio device typically implements an audio control protocol, which enables it process configuration and control messages from a remote controller. An audio control protocol also defines the structure of the messages that are exchanged between compliant devices. There are currently a wide range of audio control protocols. Some audio control protocols utilize layer 3 audio transport technology, while others utilize layer 2 audio transport technology. An audio device can only communicate with other devices that implement the same control protocol, irrespective of a common transport technology that connects the devices. The existence of different audio control protocols among devices on a network results in a situation where the devices are unable to communicate with each other. Furthermore, a single control application is unable to establish or destroy audio stream connections between the networked devices, since they implement different control protocols. When an audio engineer is designing an audio network installation, this interoperability challenge restricts the choice of devices that can be included. Even when audio transport interoperability has been achieved, common control of the devices remains a challenge. This research investigates protocol command translation as a means to enable interoperability between networked audio devices that implement different audio control protocols. It proposes the use of a command translator that is capable of receiving messages conforming to one protocol from any of the networked devices, translating the received message to conform to a different control protocol, then transmitting the translated message to the intended target which understands the translated protocol message. In so doing, the command translator enables common control of the networked devices, since a control application is able to configure and control devices that conform to different protocols by utilizing the command translator to perform appropriate protocol translation.
39

Uma arquitetura de gerência autonômica de redes virtuais baseada em sistemas multiagentes / / An architecture for autonomic management of virtual networks based on multi-agent systems

Soares Junior, Milton Aparecido, 1984- 22 August 2018 (has links)
Orientador: Edmundo Roberto Mauro Madeira / Dissertação (mestrado) - Universidade Estadual de Campinas, Instituto de Computação / Made available in DSpace on 2018-08-22T03:57:24Z (GMT). No. of bitstreams: 1 SoaresJunior_MiltonAparecido_M.pdf: 2099044 bytes, checksum: 9429a525b941834e987d70cb3b26c2fc (MD5) Previous issue date: 2013 / Resumo: Apesar do seu sucesso, a arquitetura atual da Internet _e uma fonte de vários problemas para as aplicações atuais e as demandas futuras. A virtualização da infraestrutura da rede é proposta como alternativa para solucionar esses problemas sem a necessidade de alterar o núcleo da Internet, pois ela habilita o pluralismo de arquiteturas de rede. Neste trabalho, foi desenvolvida uma arquitetura de gerência autonômica de redes virtuais baseada em sistemas multiagentes. Um protótipo que realiza a função de autocura de redes virtuais foi implementado a partir dessa arquitetura. Novos algoritmos e mecanismos foram desenvolvidos para melhorar a eficiência do protótipo. Foi realizado, também, um estudo de caso sobre a gerência de redes virtuais que leva em consideração os requisitos das aplicações que estão sendo executadas em uma nuvem. Uma plataforma de experimentação baseada em máquinas virtuais e no OpenFlow foi criada para a execução dos experimentos. Tanto o protótipo quanto a plataforma de experimentação integram ferramentas atuais criando uma única solução para a gerência de redes virtuais. Os resultados apresentados contribuem para aproximar a virtualização de redes e a gerência autonômica da realidade / Abstract: Despite its success, the current architecture of the Internet is a source of many problems for current applications and future demands. The virtualization of network infrastructure is proposed as an alternative to solve these problems without the need to change the core of the Internet, as it enables the network architecture pluralism. We have developed architecture for autonomic management of virtual networks based on multi-agent systems. Based on this architecture, we implemented a prototype that performs the function of self-healing virtual networks. New algorithms and mechanisms have been developed to improve the efficiency of the prototype. A case study on the management of virtual networks that takes into consideration the requirements of the applications that are running on a cloud is also presented. For the execution of the experiments was created an experimentation platform based on virtual machines and on OpenFlow. The prototype and the platform integrate current tools creating a single solution for management of virtual networks. The results contributed to bring network virtualization and autonomic management closer to reality / Mestrado / Ciência da Computação / Mestre em Ciência da Computação
40

Computação autonômica aplicada ao diagnóstico e solução de anomalias de redes de computadores / Autonomic computing applied to the diagnosis and solution of network anomalies

Amaral, Alexandre de Aguiar, 1986- 27 August 2018 (has links)
Orientadores: Leonardo de Souza Mendes, Mario Lemes Proença Junior / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-27T01:36:35Z (GMT). No. of bitstreams: 1 Amaral_AlexandredeAguiar_D.pdf: 3847801 bytes, checksum: 71773e4b12743836bc5dc38e572c1c63 (MD5) Previous issue date: 2015 / Resumo: A tarefa de gerenciamento de redes tem se tornado cada vez mais desafiadora. Dentre esses desafios está o problema de diagnosticar e solucionar as anomalias. As soluções atuais não têm sido suficiente para atender os requisitos demandados para a aplicação em ambientes de rede de grande escala. Os principais motivos decorrem da falta de autonomicidade e escalabilidade. Nesta tese, os conceitos da computação autonômica e distribuída são explorados para diagnosticar e solucionar anomalias de rede em tempo real. A proposta é constituída de entidades autonômicas hierarquicamente distribuídas, responsáveis por detectar e reparar as anomalias nas suas regiões de domínio com a mínima intervenção humana. Isto permite a escalabilidade, viabilizando a implantação do sistema em redes de grande escala. A autonomicidade das entidades autonômicas reduz intervenções manuais e a probabilidade de erros na análise e tomada de decisão, fazendo com que a complexidade percebida pela gerência no processo de detecção de anomalias seja reduzida. Experimentos foram realizados em duas diferentes redes: Universidade Tecnológica Federal do Paraná ¿ Campus Toledo e no Instituto Federal de Santa Catarina ¿ Campus GW. Os resultados demonstraram a eficácia e autonomicidade da solução para detectar e tratar diferentes anomalias em tempo real, com a mínima intervenção humana / Abstract: The challenges inherent to network administration increase daily. Among these challenges, there is the problem of diagnosing and repairing network anomalies. Current solutions have not been enough to meet the requirements of large scale networks. The main reasons stem from the lack of autonomicity and scalability. In this thesis, autonomic and distributed computing concepts are exploited presenting a solution to diagnose and treat network anomalies in real time. In this pro-posal, autonomic entities are hierarchically distributed, being responsible for detecting and repair-ing the anomalies in their domain, with minimal human intervention. This provides scalability, enabling the system to be deployed in large scale networks. The autonomic entities autonomicity reduces the manual intervention and the likelihood of errors in the analysis and decision process, minimizing the complexity perceived by the network management in the anomaly detection pro-cedure. Experiments were performed at two different networks: Federal University of Technolo-gy Paraná (UTFPR) - Toledo Campus and at the Federal Institute of Science and Technology Santa of Catarina - GW Campus. The results demonstrated the efficacy of the solution and its autonomicity to detect and repair various anomalies in real time, with minimal human interven-tion / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica

Page generated in 0.1266 seconds