51 |
Nätverksövervakning av trådlösa accesspunkter / Network monitoring of wireless access pointsHeino, Felix January 2016 (has links)
Syftet med examensarbetet är att analysera, implementera och utvärdera metoder för nätverksövervakning av trådlös kommunikationsutrustning i företaget Fibras nätverk. I dag sköts driften av cirka 2300 accesspunkter i Västerås stads trådlösa nätverk av Fibra. I nätverket ingår ett antal Wireless LAN Controller (WLC), vars uppgift är att hantera och konfigurera alla accesspunkter. Varje WLC kan hantera upp till 400 accesspunkter och sköter exempelvis autentiseringen av användarna. Dessutom finns det en Whats Up Gold server, vars uppgift är att samla in information om det trådlösa nätverket. Själva nätverksövervakningen presenteras i ett webbgränssnitt för drift personalen på Fibra. Examensarbetet utvärderar vilka delar av nätverket som bör övervakas, vilken information som ska samlas in och hur resultatet av övervakningen ska presenteras för drift personalen på Fibra. Dessutom görs en utvärdering av hur kommunikationen mellan Whats Up Gold servern och WLC sker bäst. Det nätverksövervakningsprogram som Fibra valt använda är Whats Up Gold. Examensarbetet inkluderar dock samtliga aspekter av nätverksövervakningsproblemet, inte bara de som ingår i programmet Whats Up Gold. Resultatet av implementationen innebär att driftpersonalen på Fibra får en särskild vy i Whats Up Gold webbgränssnitt. Den används för att felsöka och för att få en översikt av det trådlösa nätverket. Personalen får också tillgång till en larmvy, där WLC och berörda accesspunkter visas vid eventuella driftstörningar. Larmfunktionen i WLC skickar automatiskt SMS och e-mail till personal som har beredskap. Lösningen för att göra kommunikationen möjlig mellan server och WLC görs med en PBR (Policy Based Routing). En PBR är en teknik för att göra routing beslut baserat på diverse kriterier som är konfigurerade av en administratör. Genom att Fibra inför bra nätverksövervakning kommer antalet oplanerade driftstopp minska och tillgängligheten öka. Det innebär också att eventuella nätverksfel upptäcks snabbare och felsökningen i nätverket blir betydligt lättare. Nätverksövervakning sparar följaktligen både pengar och tid för ett företag som Fibra. / The purpose of this study is to analyse, implement and evaluate methods for network monitoring of wireless communication in the company Fibra. Today, Fibra managed the operation of around 2,300 access points in Västerås. The network includes a number of Wireless LAN Controller (WLC), whose task is to manage and configure all access points. Each WLC can have up to 400 access points and manage, for example, authentication of users. A servers job is to collect information from the wireless network and monitoring the result and present it in a web interface for the administrators. The thesis evaluates which parts of the network that should be monitored and what information should be gathered and how the results of the monitoring will be presented to the user. There should also be an evaluation of how the communication between the server and the WLC should be done. The network monitoring tools Fibra select to use is Whats Up Gold. The work, however, includes all aspects of the network management problem, not just those included in the program Whats Up Gold. The result of implementation means that the operating staff at Fibra received a special view of Whats Up Gold's web interface, used to troubleshoot and get an overview of the wireless network. The staff will also have access to an alarm view, where the WLC and the access points displayed on any incident. The alarm function of the WLC automatically sends SMS and e-mail to personal on duty. The solution to make communication possible between the server and the WLC is made with a PBR (Policy Based Routing). A PBR is a technology to make routing decisions based on various criteria that are configured by an administrator. By implementing network monitoring, the number of unplanned downtime is reduced and availability increased. It also means that any network failure is detected faster and troubleshooting the network becomes much easier. Network Monitoring consequently saves both money and time to a company such as Fibra.
|
52 |
Distribution and configuration of agents for NMS in a reasonable timeJonsson, Robin, Blixt, Simon January 2013 (has links)
With this paper we intended to simplify deployment and management of monitoring agents for a Network Monitoring System. We found interest on the subject since the time consumed to deploy and manage agents was found to be very inefficient. During a lecture with the Swedish based company Op5 AB at the Linnaeus University in Kalmar, Sweden, we presented the complex of problem. The lecturer showed great interest in a solution on the subject and we found it to be a great thesis subject for the Bachelor degree in Computer Science. By the year of 2016 it is expected that the number of network connected devices will grow threefold, there will be four times as much IP traffic and the data storage demand will increase tenfold. [8] This growing demand will also affect the requirement on the Network Monitoring System and in turn the monitoring agents. In this paper we created a baseline, which consisted of a timing regarding the time consumption for manual deployment, configuration and management of the monitoring agents. We also developed an automated way for deployment, configuration and management of monitoring agents by integrating a Content Management Software called Puppet, combined with several scripts. To simplify the management and deployment furthermore a widget was developed for Op5’s Web based User Interface called Ninja. The developed solution was measured against the baseline and a result regarding time consumption was presented. The result fell into a discussion on the subject of automatization and the time savings that it may result in due to less frequent human errors and a less repetitive work processes.
|
53 |
Sociální sítě jako nástroj konkurenceschopnosti / Social networks as a tool for competitivenessPěničková, Markéta January 2017 (has links)
This thesis focuses on the issue of social networks and its potential use as a tool to boost competitiveness. At first, in the theoretical part, basic terms and definitions, which are strongly related to the issue of social networks, are explained. Then the thesis deals with the business sectors, where social networks can be used. Furthermore, the most used representatives of worldwide social networks are characterized along with their potential use in the business. The theoretical part is completed with the chapter that describes and evaluates analytical tools which are used for monitoring and analysis of social networks. Practical part focuses on the aesthetic centre Marttinéz and its competitors in the sector of hairdressing and beauty salons. Firstly, its actual attitude to the social networks is analyzed and further analysis regarding competing salons is carried out the second analysis should reveal competitors' behaviour in the area of social networks. The main output of the practical part is a set of recommendations regarding optimization of company's sites at social networks and also suggestion on a monitoring system of social networks sites of this aesthetic centre.
|
54 |
Identifikace dostupnosti zařízení v technologických sítích / Identification of Device Availability in Technological NetworksVodehnal, Stanislav January 2018 (has links)
This diploma thesis deals with the monitoring of network elements of technological networks and distribution systems. There are described reasons why and what kind of values we want to monitor. Three monitoring systems are then selected, described their properties and functions. Based on their merits, one system for deploying the test environment is selected. The practical part is the configuration of the selected system and its subsequent deployment to the network.
|
55 |
Systém pro rozpoznávání APT útoků / System for Detection of APT AttacksHujňák, Ondřej January 2016 (has links)
The thesis investigates APT attacks, which are professional targeted attacks that are characterised by long-term duration and use of advanced techniques. The thesis summarises current knowledge about APT attacks and suggests seven symptoms that can be used to check, whether an organization is under an APT attack. Thesis suggests a system for detection of APT attacks based on interaction of those symptoms. This system is elaborated further for detection of attacks in computer networks, where it uses user behaviour modelling for anomaly detection. The detector uses k-nearest neighbors (k-NN) method. The APT attack recognition ability in network environment is verified by implementing and testing this detector.
|
56 |
Network Monitoring in Delay Tolerant Network / Nätverksövervakning inom avbrottstoleranta nätIsmailov, Alexej January 2015 (has links)
A Disruption Tolerant Network (DTN) is a sparse network where connectivity is regulated by the proximity of mobile nodes. Connections are sporadic and the delivery rate is closely related to node movement. As network resources often are limited in such settings, it is useful to monitor the network in order to make more efficient communication decisions. This study investigates existing routing protocols and monitoring tools for DTN that best cope with the requirements of a tactical military network. A model is proposed to estimate source to destination delay in DTN. This model is evaluated in a Java-based software simulator called The ONE. In order to match the tactical military environment, two scenarios are constructed. The squad scenario simulates the formation movement pattern of several squads and the hierarchical communication scheme that is maintained in a military context. The other scenario simulates a convoy line movement of a military group during transportation. The results of this study show that the proposed mechanism can improve delivery rate and reduce network overhead in settings with strict buffer limitations. The estimation worked best in scenarios that contained some patterns of movement or communication. These patterns are resembled in the model's collected data and the model can provide the user with rough estimates of end-to-end delays in the network. Primary use of this model has been to reduce number of old messages in the network, but other applications like anomaly detection are also discussed in this work. / Ett avbrottstolerant nätverk (DTN) är ett glest nät där konnektiviteten avgörs av närheten bland de rörliga noderna i nätverket. Avbrotten i ett sådant nät förekommer ofta och sporadiskt. Eftersom nätverksresurserna oftast är begränsade i sådana sammanhang, så är det lämpligt att övervaka nätverket för att göra det möjligt att fatta mer effektiva kommunikationsbeslut. Det här arbetet undersöker olika routingalgoritmer och övervakningsvektyg för DTN med hänsyn till de krav som ställs av ett taktiskt nät. En modell för att uppskatta fördröjningen från källa till destination är framtagen i arbetet. Modellen är utvärderad med hjälp av en Javabaserad mjukvarusimulator som heter The ONE. För att bäst representera den miljö som uppstår i militära sammanhang är två scenarion framtagna. Det första är ett truppscenario där nodernar rör sig i fromationer och nättrafiken följer den hierarkiska modellen som används i militär kommunikation. Det andra scenariot är ett konvojscenario där enheter marcherar på led. Resultaten från denna studie visar att den föreslagna modellen kan öka andelen levererade meddelanden och minska nätverksbelastningen i en miljö där bufferstorleken hos noderna är begränsad. Uppskattningen visade sig fungera bäst i scenarion som innehöll någon form av mönster bland nodernas rörelse eller deras kommunikation. Dessa mönster återspeglas i modellens insamlade data och modellen kan förse användaren med en grov estimering av slutfördröjningen till alla destinationer i nätet. Modellen har i huvudsak använts till att minska antalet gamla meddelanden i nätet, men arbetet berör även andra användningsområden som anomalidetektion.
|
57 |
A Comparison of Pull- and Push- based Network Monitoring Solutions : Examining Bandwidth and System Resource UsagePettersson, Erik January 2021 (has links)
Monitoring of computer networks is central to ensuring that they function as intended, with solutions based on SNMP being used since the inception of the protocol. SNMP is however increasingly being challenged by solutions that, instead of requiring a request-response message flow, simply send information to a central collector at predefined intervals. These solutions are often based on Protobuf and gRPC, which are supported and promoted by equipment manufacturers such as Cisco, Huawei, and Juniper. Two models exist for monitoring. The pull model used by SNMP where requests are sent out in order to retrieve data, has historically been widely used. The push model, where data is sent at predefined intervals without a preceding request, is used by the implementations using Protobuf and gRPC. There is a perceived need to understand which model more efficiently uses bandwidth and the monitored system’s memory and processing resources. The purpose of the thesis is to compare two monitoring solutions, one being SNMP, and one based on Protobuf and gRPC. This is done to determine if one solution makes more efficient use of bandwidth and the system resources available to the network equipment. This could aid those who operate networks or develop monitoring software in determining how to implement their solutions. The study is conducted as a case study, where two routers manufactured by Cisco and Huawei were used to gather data about the bandwidth, memory, and CPU utilisation of the two solutions. The results of the measurements show that when retrieving information about objects that have 1-byte values SNMP was the better performer. When objects with larger values were retrieved SNMP performed best until 26 objects were retrieved per message. Above this point the combination of Protobuf and gRPC performed better, resulting in fewer bytes being sent for a given number of objects. No impact on the memory and CPU utilisation in the routers was shown. / Övervakning av nätverk är av yttersta vikt för att säkerställa att de fungerar som tänkt. Lösningar baserade på SNMP har använts sen protokollet kom till. SNMP utmanas mer och mer av lösningar som, istället för att använda ett meddelandeflöde baserat på fråga-svar, helt enkelt sänder information till en insamlande enhet i fördefinierade intervall. Dessa lösningar baseras ofta på Protobuf och gRPC, vilka stöds och propageras för av bland andra utrustningstillverkarna Cisco, Huawei, och Juniper. Två modeller för övervakning finns. Pull-modellen där frågor skickas ut för att hämta data, används av SNMP och har historiskt sett använts i stor skala. Push- modellen, där data skickas i fördefinierade intervall utan föregående fråga, används av lösningar som använder Protobuf och gRPC. Det finns ett behov av att förstå vilken modell som på ett mer effektivt sätt använder bandbredd och de övervakade systemens minnes- och processorresurser. Syftet med denna rapport är att jämföra två övervakningslösningar. SNMP är den ena lösningen, och den andra lösningen är baserad på Protobuf och gRPC. Detta i syfte att utröna om endera lösning på ett mer effektivt sätt använder bandbredd och systemresurser i nätverksutrustning. Detta kan hjälpa nätverksoperatörer och utvecklare av mjukvara för övervakning att avgöra hur dessa bör implementeras. För att besvara detta används en fallstudie, där två routrar tillverkade av Cisco och Huawei används för att samla in data om de två lösningarnas användning av bandbredd, minne, och processorkraft. Mätningarnas resultat visade att när objekt vars värde var 1 byte hämtades så presterade SNMP bättre. När objekt vars värden var större hämtades presterade SNMP bäst tills 26 objekt hämtades per meddelande. Därefter presterade kombinationen Protobuf och gRPC bättre, och krävde färre bytes för att skicka information om ett givet antal objekt. Ingen påverkan på minnes- eller processoranvändningen i routrarna påvisades av mätresultaten.
|
58 |
On monitoring and fault management of next generation networksShi, Lei 04 November 2010 (has links)
No description available.
|
59 |
Alerta Po? - Um sistema de comunica??o apoiado em redes de sensores sem fio para monitora??o do c?rrego Itaim / Alert Po? - A supported communication system sensor networks wireless for Itaim river monitoringCardoso, Marco Antonio Ruiz 25 November 2016 (has links)
Submitted by SBI Biblioteca Digital (sbi.bibliotecadigital@puc-campinas.edu.br) on 2017-01-03T16:21:29Z
No. of bitstreams: 1
ALERTA PO? ? UM SISTEMA DE COMUNICA??O APOIADO EM REDES DE SENSORES SEM FIO PARA MONITORA??O DO C?RREGO ITAIM.pdf: 3373158 bytes, checksum: 31363a3d5310d22b8a185ceba8f3f1c6 (MD5) / Made available in DSpace on 2017-01-03T16:21:30Z (GMT). No. of bitstreams: 1
ALERTA PO? ? UM SISTEMA DE COMUNICA??O APOIADO EM REDES DE SENSORES SEM FIO PARA MONITORA??O DO C?RREGO ITAIM.pdf: 3373158 bytes, checksum: 31363a3d5310d22b8a185ceba8f3f1c6 (MD5)
Previous issue date: 2016-11-25 / The problems of floods in Brazil cause many difficulties in the lives of many Brazilians throughout the country. Examples such as S?o Paulo, where during the summer the heavy rains, attached to infrastructure problems, enhance transit and leave homeless, or as Po? suffering almost every year with social problems arising from flooding revealing that the problem is recurrent. In this sense, to minimize financial losses and, above all, avoid loss of life (deaths), this work presents a development proposal to interconnect wireless sensor networks and the Internet using low-cost sensors for the level of streams monitoring and rivers urban. In this research the main objective is to provide a reliable system of monitoring streams of water level, crossing a city and contribute to the security of the population, built through the use of a network of sensors without low financial cost wire. The collected data is transmitted in real time to the City Security Control Center that treats these raw data and makes them available in useful information and easy viewing of the stream water level of the residents in the municipality of Po? through a page Web Prefecture. To increase agility in decision-making, information will also be available to citizens through an application installed on mobile devices (smartphones or tablets) that allows the current view of the percentage of water in the stream. The case study results showed the feasibility of implementing this proposal therefore be demonstrated that the water level in the stream monitoring using low cost sensors through a web page and application for mobile devices is possible. With the implementation of wireless sensor network citizens begin to monitor and be alerted to possible flooding, enabling the rescue of material goods and human lives. / Os problemas das enchentes no Brasil causam diversas dificuldades na vida de v?rios brasileiros em todo o territ?rio nacional. Exemplos como o de S?o Paulo, onde durante o ver?o o excesso de chuvas, unido a problemas de infraestrutura, intensificam o tr?nsito e deixam desabrigados, ou como de Po? que sofre praticamente todos os anos com problemas sociais decorrentes de enchentes revelando que o problema ? recorrente. Neste sentido, para minimizar preju?zos financeiros e, principalmente, evitar perda de vidas (mortes), este trabalho apresenta uma proposta de desenvolvimento para interconex?o de redes de sensores sem fio e a internet utilizando sensores de baixo custo para monitoramento do n?vel de c?rregos e rios urbanos. Nesta pesquisa o principal objetivo ? oferecer um sistema confi?vel de monitora??o do n?vel de ?gua de c?rregos, que atravessam uma cidade e que contribua com a seguran?a da popula??o, constru?do por meio do uso de uma rede de sensores sem fio de baixo custo financeiro. Os dados coletados s?o transmitidos em tempo real para o Centro de Controle de Seguran?a da Cidade que trata estes dados brutos e os disponibiliza em informa??es ?teis e de f?cil visualiza??o sobre o n?vel de ?gua do c?rrego aos cidad?os residentes no Munic?pio de Po? atrav?s de uma p?gina web da Prefeitura. Para aumentar a agilidade na tomada de decis?es, as informa??es tamb?m estar?o dispon?veis aos cidad?os por meio de um aplicativo instalado em dispositivos m?veis (smartphones ou tablets) que permite a visualiza??o atual da porcentagem de ?gua no c?rrego. Os resultados do estudo de caso apontaram para a viabilidade de implementa??o desta proposta, pois, demostrou-se que ? poss?vel o monitoramento do n?vel de ?gua no c?rrego utilizando sensores de baixo custo atrav?s de uma p?gina web e aplicativo para dispositivos m?veis. Com a implementa??o da rede de sensores sem fio os cidad?os passam a monitorar e a serem alertados sobre poss?veis enchentes, possibilitando o salvamento de bens materiais e de vidas humanas.
|
60 |
Development of a Social Network Monitoring Framework and Key Performance Indicators for a Professional Haircare Company / Návrh rámce pro monitoring sociálních médií a klíčových ukazatelů výkonnosti pro společnost působící na trhu vlasové kosmetikyMaurer, Julia Elisabeth January 2016 (has links)
This work reviews the current literature and application methods of strategic KPI frameworks, KPI definition and measurement, target setting and benchmarking for social networks based on journals, books and whitepapers while including an interview with a social media agency. In a second step, the acquired knowledge is applied on a case study for a salon haircare company. The conclusions are based on in-company experts in the field, external social media agencies and an internal survey. Based on a behavioral survey, the requirements and gaps in the organization are identified. This leads to the application of a theoretical framework on the case company and a suitable definition of KPIs. The final delivery includes an analytical tool measuring all KPIs. Finally, all KPIs are related to targets and benchmarks from industry, social network sites, competitors and historical data. The final results are easily transferrable to other players in the industry.
|
Page generated in 0.1098 seconds