41 |
End-to-end delay margin based traffic engineeringAshour, Mohammed January 2007 (has links)
No description available.
|
42 |
Design and implementation of a network controller for a local area networkChatterjee, Aditya Narayan January 1986 (has links)
Resource Management is an extremely important concern for the network manager. Of the bus, ring and the star network topologies, usually employed in a local area network, the bus topology provides the highest reliability. However, peer-to-peer protocols usually followed in such a topology, make it extremely difficult to incorporate resource management features at a lower level of network architecture.
This thesis presents design considerations for a session-level network controller, to be implemented on a local area network with a bus topology. The controller, will provide essential resource management, and attempt to improve the throughput of the network. The design is based on a single-board computer, and a streamlined operating system is also included in the design. It is claimed that such an environment will be ideal for networking tasks, like the controller presented. The design is software-oriented, though device selection is discussed, both for the controller and its network interface. The local area network used for the development of this project is a sixteen hundred node campus network at Virginia Tech ( using LocalNet 20) supplied by SYTEK, Inc. / M.S.
|
43 |
Adaptive polling for SNMP protocolTeng, Un Tung 01 January 1999 (has links)
No description available.
|
44 |
QoS management in ATM with delays and cell-dropsWang, Jun 01 January 1999 (has links)
No description available.
|
45 |
Roam : a resource offering agency and mobility for efficient network and system managementBruce, Steven Douglas 01 April 2002 (has links)
No description available.
|
46 |
Easy Net Admin: Inventory tool for network administratorsReddy, Rohini Mopu 01 January 2004 (has links)
The purpose of this project was to develop a tool / utility for network administrators to maintain information about all the systems operated by the College of Natural Sciences at California State University, San Bernardino.
|
47 |
Governance of virtual private networks using COBIT as frameworkSherry, Zaida 04 1900 (has links)
Thesis (MAcc (Accountancy))--University of Stellenbosch, 2007. / The purpose of this assignment is to ascertain whether the COBIT framework is an adequate framework to assist in the governance of virtual private networks. The assignment focuses on whether the framework can ensure the identification of virtual private network-related risks and address IT compliance with policies and statutory regulations.
A brief summary of the risks and issues pertaining to the pre-implementation, implementation and post-implementation phases of virtual private networks is included in the assignment. These risks and issues are then individually mapped onto a relevant COBIT control objective. The scope of the assignment does not include the intricacies of how these networks operate, the different types of network topologies or the different technologies used in virtual private networks.
It was found that the COBIT framework can be implemented to manage and/or mitigate virtual private network risks.
|
48 |
Technoeconomic aspects of next-generation telecommunications including the Internet serviceUnknown Date (has links)
This research is concerned with the technoeconomic aspects of modern and next-generation telecommunications including the Internet service. The goal of this study thereof is tailored to address the following: (i) Reviewing the technoeconomic considerations prevailing in telecommunication (telco) systems and their implicating futures; (ii) studying relevant considerations by depicting the modern/next-generation telecommunications as a digital ecosystem viewed in terms of underlying complex system evolution (akin to biological systems); (iii) pursuant to the digital ecosystem concept, co-evolution modeling of competitive business structures in the technoeconomics of telco services using dichotomous (flip-flop) states as seen in prey-predator evolution; (iv) specific to Internet pricing economics, deducing the profile of consumer surplus versus pricing model under DiffServ QoS architecture pertinent to dynamic- , smart- and static-markets; (v) developing and exemplifying decision-making pursuits in telco business under non-competitive and competitive markets (via gametheoretic approach); (vi) and modeling forecasting issues in telco services addressed in terms of a simplified ARIMA-based time-series approach, (which includes seasonal and non-seasonal data plus goodness-fit estimations in time- and frequency-domains). Commensurate with the topics indicated above, necessary analytical derivations/models are proposed and computational exercises are performed (with MatLabTM R2006b and other software as needed). Extensive data gathered from open literature are used thereof and, ad hoc model verifications are performed. Lastly, results are discussed, inferences are made and open-questions for further research are identified. / by Renata Cristina Tourinho Sardenberg. / Thesis (Ph.D.)--Florida Atlantic University, 2010. / Includes bibliography. / Electronic reproduction. Boca Raton, Fla., 2010. Mode of access: World Wide Web.
|
49 |
Network-layer reservation TDM for ad-hoc 802.11 networksDuff, Kevin Craig January 2008 (has links)
Ad-Hoc mesh networks offer great promise. Low-cost ad-hoc mesh networks can be built using popular IEEE 802.11 equipment, but such networks are unable to guarantee each node a fair share of bandwidth. Furthermore, hidden node problems cause collisions which can cripple the throughput of a network. This research proposes a novel mechanism which is able to overcome hidden node problems and provide fair bandwidth sharing among nodes on ad-hoc 802.11 networks, and can be implemented on existing network devices. The scheme uses TDM (time division multiplexing) with slot reservation. A distributed beacon packet latency measurement mechanism is used to achieve node synchronisation. The distributed nature of the mechanism makes it applicable to ad-hoc 802.11 networks, which can either grow or fragment dynamically.
|
50 |
Detecção de anomalias em redes de computadores / Anomaly detection in computer networksZarpelão, Bruno Bogaz 16 August 2018 (has links)
Orientadores: Leonardo de Souza Mendes, Mario Lemes Proença Junior / Tese (doutorado) - Universidade Estadual de Campinas, Faculdade de Engenharia Elétrica e de Computação / Made available in DSpace on 2018-08-16T19:18:19Z (GMT). No. of bitstreams: 1
Zarpelao_BrunoBogaz_D.pdf: 5089650 bytes, checksum: 281e7d926aae4a7e05a2e94347a06179 (MD5)
Previous issue date: 2010 / Resumo: Anomalias em redes de computadores são desvios súbitos e acentuados que ocorrem no tráfego em consequência de diversas situações como defeitos em softwares, uso abusivo de recursos da rede, falhas em equipamentos, erros em configurações e ataques. Nesta tese, é proposto um sistema de detecção de anomalias em redes de computadores baseado em três níveis de análise. O primeiro nível de análise é responsável por comparar os dados coletados em um objeto SNMP (Simple Network Management Protocol) com o perfil de operações normais da rede. O segundo nível de análise correlaciona os alarmes gerados no primeiro nível de análise utilizando um grafo de dependências que representa as relações entre os objetos SNMP monitorados. O terceiro nível de análise reúne os alarmes de segundo nível utilizando informações sobre a topologia de rede e gera um alarme de terceiro nível que reporta a propagação da anomalia pela rede. Os testes foram realizados na rede da Universidade Estadual de Londrina, utilizando situações reais. Os resultados mostraram que a proposta apresentou baixas taxas de falsos positivos combinadas a altas taxas de detecção. Além disso, o sistema foi capaz de correlacionar alarmes gerados para diferentes objetos SNMP em toda a rede, produzindo conjuntos menores de alarmes que ofereceram ao administrador de redes uma visão panorâmica do problema / Abstract: Anomalies in computer networks are unexpected and significant deviations that occur in network traffic due to different situations such as software bugs, unfair resource usage, failures, misconfiguration and attacks. In this work, it is proposed an anomaly detection system based on three levels of analysis. The first level of analysis is responsible for comparing the data collected from SNMP (Simple Network Management Protocol) objects with the profile of network normal behavior. The second level of analysis correlates the alarms generated by the first level of analysis by using a dependency graph, which represents the relationships between the SNMP objects. The third level of analysis correlates the second level alarms by using network topology information. The third level generates a third level alarm that presents the anomaly propagation path through the network. Tests were performed in the State University of Londrina network, exploring real situations. Results showed that the proposal presents low false positive rates and high detection rates. Moreover, the proposed system is able to correlate alarms that were generated for SNMP objects at different places of the network, producing smaller sets of alarms that offer a wide-view of the problem to the network administrator / Doutorado / Telecomunicações e Telemática / Doutor em Engenharia Elétrica
|
Page generated in 0.0998 seconds