51 |
HOW ENABLE EFFICIENT INFORMATION INTERCHANGES IN VIRTUALPONNA, CHAITANYA, CHOWDARY BODEPUDI, RAKESH January 2011 (has links)
The Internet is a collection of computer networks; it is the most important networkingenvironment in the world, it used for information interchanges in virtual network. Wirelesstechnologies, such as Wi-Fi, WiMAX etc, can suggest more suitable and cooler way forinformation interchanges in virtual network.The most well-known ongoing wireless city projects are counting Wireless Philadelphia, GoogleWi-Fi Mountain View, Wireless Taipei City, and San Francisco Tech Connect project. Web haslimits of interactivity and presentation. The Web’s client-server architecture blocks informationexchange. Furthermore, most Web applications are only intended for conservative computers,not for mobile handheld devices. In period of information exchange on the Web, the new Web2.0 is suggested. Web 2.0 refers to a perceived or planned second generation of Internet-basedservices, such as public networking sites, wikis, communication tools, which highlight onlineteamwork and sharing among users.A virtual network or online community is a collection of people that may or may not chiefly ororiginally connect or interact via the Internet. Virtual network have also become an additionalform of communication amid people who know each other in actual life. Today, virtual networkcan be used insecurely for a diversity of social collections interacting via the Internet. It does notunavoidably mean that there is a solid bond between the members.The validation methods like internal validity, external validity and Reliability for this researchand how it affects these methods for our research. We also use interview method has beenconsidered for this research. We will use diagrams, models, prototypes, and texts, to illuminate our result. We will define allthe diagrams and models and prototypes in my own text. We will give the reference of theoriginal data collected from various sources where as from Internet, websites, books andJournals. / Program: Magisterutbildning i informatik
|
52 |
Routing, Resource Allocation and Network Design for Overlay NetworksZhu, Yong 13 November 2006 (has links)
Overlay networks have been the subject of significant research and practical interest recently in addressing the inefficiency and ossification of the current Internet. In this thesis, we cover various aspects of overlay network design, including overlay routing algorithms, overlay network assignment and multihomed overlay networks. We also examine the behavior of overlay networks under a wide range of network settings and identify several key factors that affect the performance of overlay networks. Based on these findings, practical design guidelines are also given. Specifically, this thesis addresses the following problems:
1) Dynamic overlay routing: We perform an extensive simulation study to investigate the performance of available bandwidth-based dynamic overlay routing from three important aspects: efficiency, stability, and safety margin. Based on the findings, we propose a hybrid routing scheme that achieves good performance in all three aspects. We also examine the effects of several factors on overlay routing performance, including network load, traffic variability, link-state staleness, number of overlay hops, measurement errors, and native sharing effects.
2) Virtual network assignment: We investigate the virtual network (VN) assignment problem in the scenario of network virtualization. Specifically, we develop a basic VN assignment scheme without reconfiguration and use it as the building block for all other advanced algorithms. Subdividing heuristics and adaptive optimization strategies are presented to further improve the performance. We also develop a selective VN reconfiguration scheme that prioritizes the reconfiguration for the most critical VNs. 3) Overlay network configuration tool for PlanetLab: We develop NetFinder, an automatic overlay network configuration tool to efficiently allocate PlanetLab resources to individual overlays. NetFinder continuously monitors the resource utilization of PlanetLab and accepts a user-defined overlay topology as input and selects the set of PlanetLab nodes and their interconnection for the user overlay. 4) Multihomed overlay network: We examine the effectiveness of combining multihoming and overlay routing from the perspective of an overlay service provider (OSP). We focus on the corresponding design problem and examine, with realistic network performance and pricing data, whether the OSP can provide a network service that is profitable, better (in terms of round-trip time), and less expensive than the competing native ISPs.
|
53 |
Political Skills in virtuellen NetzwerkenCurtaz, Kimjana, Dunkel, Barbara, Jack, Ann-Katrin, Jacob, Davina, Joseph, Timmo, Sach, Katrin, Staar, Henning, Verfürth, Caroline, Janneck, Monique 30 May 2014 (has links) (PDF)
No description available.
|
54 |
Knowledge Management als Dienstleistung in einem virtuellen Netzwerk aus dezentral organisierter Technologietransferstellen und WirtschaftsunternehmenDangelmaier, Wilhelm, Emmrich, Andreas, Huber, Daniel, Tenholt, Hermann, Donath, Matthias 15 December 2014 (has links) (PDF)
Innovative Produkt- und Verfahrensentwicklungen sowie die Einführung neuer Technologien setzen insbesondere für Existenzgründer sowie kleine- und mittlere Unternehmen (KmU) firmenübergreifende Kommunikation und Kooperation voraus. Weil insbesondere diesen Unternehmen häufig der Kontakt zu externen Partnern fehlt, sind sie auf die Leistungsangebote von Technologietransferstellen bei der Vermittlung von Informationen und Kontakten zur Umsetzung aus der Forschung abgeleiteter und in der betrieblichen Praxis eingesetzter Produktionsverfahren und -technologien angewiesen. Diese als Intermediäre agierenden Akteure können aufgrund ihrer Wissensbasis relevante Informationen selektieren und dem Nutzer zielgerecht zur Verfügung stellen. Hiermit bieten Sie einen Vorteil gegenüber WZ93-klassifikationsbasierten oder analogen Verzeichniseinträgen und Recherchedatenbanken, die darüber hinaus eine Qualifizierung der erhaltenen Informationen nicht leisten können. In diesem Beitrag werden aufbauend auf einer Darstellung der Problemstellung im Technologietransfer speziell für Existenzgründer sowie KmU, die Anforderungen eines dezentral organisierten Technologietransfer-Netzwerks an einen virtuellen Technologieatlas als Wissensbasis und KM-Instrument vorgestellt. Nachfolgend werden bestehende Konzepte virtueller Technologieatlasse hinsichtlich ihrer Eignung zur Problemlösung entsprechend den vorliegenden Anforderungen der Transferstellen aus der Beispielregion HELLWEG evaluiert. Abschließend wird das entwickelte Konzept für einen virtuellen Technologieatlas hinsichtlich zugrunde liegender technologischer, inhaltlicher und verfahrenstechnischer Merkmale vorgestellt und in Bezug auf zu erreichende Nutzeneffekte bewertet.
|
55 |
VN Embedding in SDN-based Metro Optical Network for Multimedia ServicesZaman, Faisal Ameen January 2017 (has links)
Currently a growing number of users depend on the Edge Cloud Computing Paradigm in a Metro Optical Network (MON). This has led to increased competition among the Cloud Service Providers (CPs) to supply incentives for the user through guaranteed Quality of Service (QoS). If the CP fails to guarantee the QoS for the accepted request, then the user will move to another CP. Making an informed decision dynamically in such a sensitive situation demands that the CP knows the user's application requirements. The Software Defined Networking (SDN) paradigm enabled the CP to achieve such desired requirement. Therefore, a framework called Virtual Network Embedding on SDN-based Metro Optical Network (VNE-MON) is proposed in this Thesis. The use of SDN paradigm in the framework guarantees profit to the CP as well as QoS to the user.\par
The design concept of the SDN control plane, raises concerns regarding its scalability, reliability and performance compared to a traditionally distributed network. To justify concerns regarding the SDN, the performance of VNE-MON and its possible dependancy on the controller location is investigated. Several strategies are proposed and formulated using Integer Linear Programming to determine the controller location in a MON. Performance results from the assessment of the VNE-MON illustrates that it is more stable compare to GMPLS-based network. It is evident that the controller location's attributes have a significant effect on the efficacy of the accepted VN request.
|
56 |
Zavedení Self-service BI u MVNO GoMobil / Implementation of Self-Service BI at MVNO GoMobilŘehoř, František January 2013 (has links)
The main objectives of this work are determining Self-Service Business Intelligence as one of Business Intelligence approaches, description and characterization of Qlik Sense and finally development of particular solution using the above tool. In the first part thesis deals with the theoretical side of the approach, describes its advantages and disadvantages and users coming into contact with the respective technologies. Subsequently, thesis specifies requirements for Self-Service Business Intelligence and mentions different requirements and sizes of solutions in organizations. At the end recommendations for the implementation of the approach and technologies are mentioned. The second part is devoted to Qlik Sense platform, as one of the representatives based on the Self-Service approach. At first basic features, options and benefits are described. Then the development of solutions and principles of work with this tool are explained. Finally, architecture of enterprise server solution is described together with installation steps and basic configuration of a Qlik Sense site. The third part is focused on mobile virtual operator GoMobil, its current state, Business Intelligence needs and last but not least the requirements and development of solution using Qlik Sense platform.
|
57 |
Political Skills in virtuellen NetzwerkenCurtaz, Kimjana, Dunkel, Barbara, Jack, Ann-Katrin, Jacob, Davina, Joseph, Timmo, Sach, Katrin, Staar, Henning, Verfürth, Caroline, Janneck, Monique January 2011 (has links)
No description available.
|
58 |
Un système de surveillance et détection de menaces utilisant le traitement de flux comme une fonction virtuelle pour le Big Data / A monitoring and threat detection system using stream processing as a virtual function for Big DataAndreoni Lopez, Martin Esteban 06 June 2018 (has links)
La détection tardive des menaces à la sécurité entraîne une augmentation significative du risque de dommages irréparables, invalidant toute tentative de défense. En conséquence, la détection rapide des menaces en temps réel est obligatoire pour l'administration de la sécurité. De plus, la fonction de virtualisation de la fonction réseau (NFV) offre de nouvelles opportunités pour des solutions de sécurité efficaces et à faible coût. Nous proposons un système de détection de menaces rapide et efficace basé sur des algorithmes de traitement de flux et d'apprentissage automatique. Les principales contributions de ce travail sont : i) un nouveau système de détection des menaces de surveillance basé sur le traitement en continu, ii) deux ensembles de données, d'abord un ensemble de données de sécurité synthétiques contenant à la fois du trafic légitime et malveillant, et le deuxième, une semaine de trafic réel d'un opérateur de télécommunications à Rio de Janeiro, au Brésil, iii) un algorithme de pré-traitement de données, un algorithme de normalisation et un algorithme de sélection de caractéristiques rapides basé sur la corrélation entre des variables, iv) une fonction de réseau virtualisé dans une plate-forme Open Source pour fournir un service de détection des menaces en temps réel, v) placement quasi-optimal des capteurs grâce à une heuristique proposée pour positionner stratégiquement les capteurs dans l'infrastructure du réseau, avec un nombre minimal de capteurs, et enfin vi) un algorithme glouton qui alloue à la demande une séquence de fonctions de réseau virtuel. / The late detection of security threats causes a significant increase in the risk of irreparable damages, disabling any defense attempt. As a consequence, fast real-time threat detection is mandatory for security administration. In addition, Network Function Virtualization (NFV) provides new opportunities for efficient and low-cost security solutions. We propose a fast and efficient threat detection system based on stream processing and machine learning algorithms. The main contributions of this work are i) a novel monitoring threat detection system based on streaming processing, ii) two datasets, first a dataset of synthetic security data containing both legitimate and malicious traffic, and the second, a week of real traffic of a telecommunications operator in Rio de Janeiro, Brazil, iii) a data pre-processing algorithm, a normalizing algorithm and an algorithm for fast feature selection based on the correlation between variables, iv) a virtualized network function in an Open source Platform for providing a real-time threat detection service, v) near-optimal placement of sensors through a proposed heuristic for strategically positioning sensors in the network infrastructure, with a minimum number of sensors, and finally vi) a greedy algorithm that allocates on demand a sequence of virtual network functions.
|
59 |
Algorithms and Benchmarking for Virtual Network MappingKandoor, Arun Kumar 01 January 2011 (has links) (PDF)
Network virtualization has become a primary enabler to solve the internet ossi- fication problem. It allows to run multiple architectures or protocols on a shared physical infrastructure. One of the important aspects of network virtualization is to have a virtual network (VN) mapping technique which uses the substrate resources efficiently. Currently, there exists very few VN mapping techniques and there is no common evaluation strategy which can test these algorithms effectively. In this thesis, we advocate the need for such a tool and develop it by considering a wide spectrum of parameters and simulation scenarios. We also provide various performance metrics and do a comparison study of the existing algorithms. Based on the comparative study, we point out the positives and negatives of the existing mapping algorithms and propose a new LP formulation based on Hub location approach that efficiently allocates substrate resources to the virtual network requests. Our results show that our algorithm does better in terms of number of successful network mappings and average time to map while balancing load on the network.
|
60 |
Service Provisioning in SDN using a Legacy Network Management Systemvan 't Hof, David M. January 2016 (has links)
Software Defined Networking (SDN) has become increasingly popular in combination with Network Function Virtualization (NFV). SDN is a way to make a network more programmable and dynamic. However, in order to create a homogeneous network using this concept, legacy equipment will have to be substituted by SDN equipment, which is costly. To close the gap between the legacy world and SDN, we introduce the concept of a legacy Network Management System (NMS) that is connected to an SDN controller to perform service provisioning. This way, the NMS is capable of configuring both legacy as well as SDN networks to provide customers with the services that they have ordered, while still allowing for new SDN features in the SDN domain of the network. The main service we wish to provide using SDN is Service Function Chaining (SFC). Service provisioning consists of dynamically constructing a path through the ordered network services, in this case Virtual Network Functions (VNFs). This thesis focuses on the SDN controller and its interaction with the NMS. This project aims at configuring OpenFlow rules in the network using an SDN controller to perform SFC. Moreover, the focus will be on how to represent an SDN element and a service function chain in the legacy network NMS. The thesis also contains a discussion on what information should be exchanged between the management software and the controller. The management software used is called BECS, a system developed by Packetfront Software. Integrating SDN in BECS is done by creating a proof of concept, containing a full environment from the low level network elements to the NMS. By using a bottom-up approach for creating this proof of concept, the information that BECS is required to send to the SDN controller can be identified before designing and implementing the connection between these two entities. When sending the information, the NMS should be able to receive acknowledgement of successful information exchange or an error. However, when the proof of concept was created a problem arose on how to test and troubleshoot it. For this reason, a web Graphical User Interface (GUI) was created. This GUI shows the number of packets that have gone through a VNF. Because it is possible to see how many packets go through a VNF, one can see where a network issue occurs. The subsequent analysis investigates the impact of making such a GUI available for a network administrator and finds that the part of the network where the configuration error occurs can be narrowed down significantly. / Software Defined Networking (SDN) har blivit mer och mer populärt i kombination med Network Function Virtualization (NFV). SDN är en sätt för att göra ett nätverk mer programmerbart och dynamiskt. För att skapa ett homogent nätverk med detta koncept, behöver man dock ersätta traditionell utrustning med SDN utrustning som är dyr. För att stänga gapet mellan traditionella nätverk och SDN-världen, introducerar vi ett koncept med ett traditionell Network Management System (NMS) som är anslutet till en SDN-styrenhet för att utföra tjänsteprovisionering. På detta sätt kan NMS:et konfigurera både traditionella och SDN-nätverk, samt provisionera tjänster för kunderna medan nya SDN-funktioner möjliggörs i SDN-delen av nätverket. Den huvudsakliga tjänsten som vi vill lansera genom SDN är Service Function Chaining (SFC). Tjänsteprovisionering består av att konstruera en väg genom beställda tjänster, i detta fall Virtual Network Functions (VNFs). Detta examensarbete fokuserar huvusakligen på SDN-styrenheten och dess interaktion med NMS:et. Projektet syftar till att konfigurera OpenFlow regler i SDN-styrenheten för att utföra SFC. Dessutom fokuserar arbetet på hur man kan representera SDN-element och SFCs i ett traditionellt NMS. Vidare diskuteras vilken information som ska utbytas mellan NMS:et och SDNstyrenheten. NMS:et som ska vara användas är BECS, ett system utvecklat av Packetfront Software. Uppgiften löses genom att skapa ett proof of concept, som innehåller ett komplett system med alla komponenter från nätverkselement till NMS:et. Genom att använda en bottom-up-strategi för detta proof of concept kan informationen som BECS måste skicka till SDN styrenheten indentifieras, innan design och implementation av förbindelsen mellan enheterna kan utföras. När informationen är skickad ska NMS:et kunna hämta information om huruvida styrenheten fick informationen utan fel. Dock uppstår ett problem gällande hur man testar och felsöker detta proof of concept. Av denna anledning skapades ett web Graphical User Interface (GUI). Användargränssnittet visar antalet paket som går genom varje VNF, samt var i nätverket fel uppstår. Analysen undersöker hur stor effekten är för en nätverkadministrator och visar att området där fel kan uppstå begränsas avsevärt.
|
Page generated in 0.0539 seconds