Dissertations / Theses on the topic 'Network configuration management'

To see the other types of publications on this topic, follow the link: Network configuration management.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Network configuration management.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Siu, Joao Baptista. "Network configuration management systems." Thesis, University of Macau, 2001. http://umaclib3.umac.mo/record=b1447841.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Yanrong. "Network configuration management in heterogeneous ATM environments." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/tape17/PQDD_0022/MQ27019.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Martin, Todd. "Network configuration and change management software selection for Company XYZ." Menomonie, WI : University of Wisconsin--Stout, 2006. http://www.uwstout.edu/lib/thesis/2006/2006martint.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Doshi, Abhay. "Fault/configuration management for wireless ad-hoc network." FIU Digital Commons, 2002. http://digitalcommons.fiu.edu/etd/3081.

Full text
Abstract:
An ad hoc network is maintained by the combined efforts of all the mobile nodes themselves, who often operate under severe constraints, such as limited battery power, variable link quality, and limited storage capacity. As a result, there is a growing need for enhanced fault and configuration management solutions to help in tracking problems as well as solving them. Viable network architecture for a wireless ad-hoc environment, which takes advantages of both hierarchical and distributed architectures, has been investigated. A complete design solution is proposed which makes ad-hoc environments less susceptible to faults. Results shows that by applying the proposed power saving technique, network load due to control traffic may be significantly reduced. Based on other gathered statistics, we can set the optimal value of maximum number of nodes allowed in a cluster for efficient performance to be 35 for a specific scenario.
APA, Harvard, Vancouver, ISO, and other styles
5

Sipahutar, Halomoan. "Web-based network management configuration for the Indonesian Eastern Fleet Wide Area Network." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2001. http://handle.dtic.mil/100.2/ADA390446.

Full text
Abstract:
Thesis (M.S. in Information Technology Management) Naval Postgraduate School, March 2001.
Thesis advisors, John Osmundson, Rex Buddenberg. Includes bibliographical references (p. 183-184). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
6

Brewer, Mack L. "Implementation of a configuration management system for a local area network." Thesis, Monterey, California. Naval Postgraduate School, 1991. http://hdl.handle.net/10945/28274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Simard, François. "A packet radio network design for field, mobile multimedia communications, network configuration, radio channel access and network management." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1997. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ28459.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Raza, Syed Kamran. "A plug-and-play approach with distributed computing alternatives for network configuration management." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1999. http://www.collectionscanada.ca/obj/s4/f2/dsk1/tape8/PQDD_0003/MQ43346.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Raza, Syed Kamran Carleton University Dissertation Engineering Systems and Computer. "A Plug-and-play approach with distributed computing alternatives for network configuration management." Ottawa, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Van, Graan Sebastiaan Jan. "Network configuration improvement and design aid using artificial intelligence." Pretoria : [s.n.], 2007. http://upetd.up.ac.za/thesis/available/etd-08292008-170524/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Rezk, Rasha Saber Mahmoud. "Exploring the constraining influence of product attributes on value network configuration and dispersion." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708854.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Liu, Yang. "Exploring the interrelationship between supply network configuration, capabilities and green supply chain management strategies." Thesis, University of Cambridge, 2015. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.708635.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Hara, Yoritoshi [Verfasser]. "Inter-Firm Relationship Management : Activity Coordination, Resource Configuration, Trust Building, and Network Orchestration / Yoritoshi Hara." Berlin : Freie Universität Berlin, 2020. http://d-nb.info/121950839X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Homer, John. "A comprehensive approach to enterprise network security management." Diss., Manhattan, Kan. : Kansas State University, 2009. http://hdl.handle.net/2097/1372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Daley, Marcia. "Exploring the Relationship between Supply Network Configuration, Interorganizational Information Sharing and Performance." Digital Archive @ GSU, 2009. http://digitalarchive.gsu.edu/managerialsci_diss/16.

Full text
Abstract:
ABSTRACT EXPLORING THE RELATIONSHIP BETWEEN SUPPLY NETWORK CONFIGURATION, INTER-ORGANIZATIONAL INFORMATION SHARING AND PERFORMANCE By MARCIA DALEY August 2008 Committee Chair: Dr. Subhashish Samaddar Major Department: Decision Science Critical to the success of a firm is the ability of managers to coordinate the complex network of business relationships that can exist between business partners in the supply network. However many managers are unsure on how best to leverage their resources to capitalize on the information sharing opportunities that are available in such networks. Although there is significant research on information sharing, the area of inter-organizational information sharing (IIS) is still evolving and there is limited research on IIS in relation to systemic factors within supply networks. To help fill this gap in the literature, a primary focus of this dissertation is on the relationship between the design of the supply network and IIS. The design of the supply network is characterized by the supply network configuration which is comprised of (1) the network pattern, (2) the number of stages in the supply network, and (3) where the firm is located in that supply network. Four different types of IIS are investigated, herein. These types of IIS are a function of the frequency with which information is shared and the scope of information shared. Type 1 (Type 2) IIS is the low (high) frequency state where only operational information is shared. Similarly, Type 3 (Type 4) is the low (high) frequency state where strategic information is shared. The argument is that the type of IIS varies depending on the configuration of the supply network and that this relationship is influenced by the coordination structure established between firms in the network. The second focus of this dissertation deals with the relationship between IIS and performance. Research findings on the benefits to be gained from IIS have been ambiguous, with some researchers claiming reduced cost in the supply network with IIS, and others finding minimal or no benefits. To add clarity to these findings, the role that uncertainty plays in the relationship between IIS and performance is examined. The thesis presented is that the positive relationship between IIS types and the performance of the supply network is impacted by process uncertainty (i.e. the variability in process outcomes and production times), and partner uncertainty. Social network theory and transaction cost economics provide the theoretical lens for this dissertation. A model is developed and will be empirically validated in a cross-sectional setting, utilizing a sampling frame randomly selected and comprised of supply management executives from various industries within the United States.
APA, Harvard, Vancouver, ISO, and other styles
16

Martínez, Anny. "An ontology-based approach toward the configuration of heterogeneous network devices." Doctoral thesis, Universitat Politècnica de Catalunya, 2015. http://hdl.handle.net/10803/299803.

Full text
Abstract:
Despite the numerous efforts of standardization, semantic issues remain in effect in many subfields of networking. The inability to exchange data unambiguously between information systems and human resources is an issue that hinders technology implementation, semantic interoperability, service deployment, network management, technology migration, among many others. In this thesis, we will approach the semantic issues in two critical subfields of networking, namely, network configuration management and network addressing architectures. The fact that makes the study in these areas rather appealing is that in both scenarios semantic issues have been around from the very early days of networking. However, as networks continue to grow in size and complexity current practices are becoming neither scalable nor practical. One of the most complex and essential tasks in network management is the configuration of network devices. The lack of comprehensive and standard means for modifying and controlling the configuration of network elements has led to the continuous and extended use of proprietary Command Line Interfaces (CLIs). Unfortunately, CLIs are generally both, device and vendor-specific. In the context of heterogeneous network infrastructures---i.e., networks typically composed of multiple devices from different vendors---the use of several CLIs raises serious Operation, Administration and Management (OAM) issues. Accordingly, network administrators are forced to gain specialized expertise and to continuously keep knowledge and skills up to date as new features, system upgrades or technologies appear. Overall, the utilization of proprietary mechanisms allows neither sharing knowledge consistently between vendors' domains nor reusing configurations to achieve full automation of network configuration tasks---which are typically required in autonomic management. Due to this heterogeneity, CLIs typically provide a help feature which is in turn an useful source of knowledge to enable semantic interpretation of a vendor's configuration space. The large amount of information a network administrator must learn and manage makes Information Extraction (IE) and other forms of natural language analysis of the Artificial Intelligence (AI) field key enablers for the network device configuration space. This thesis presents the design and implementation specification of the first Ontology-Based Information Extraction (OBIE) System from the CLI of network devices for the automation and abstraction of device configurations. Moreover, the so-called semantic overload of IP addresses---wherein addresses are both identifiers and locators of a node at the same time---is one of the main constraints over mobility of network hosts, multi-homing and scalability of the routing system. In light of this, numerous approaches have emerged in an effort to decouple the semantics of the network addressing scheme. In this thesis, we approach this issue from two perspectives, namely, a non-disruptive (i.e., evolutionary) solution to the current Internet and a clean-slate approach for Future Internet. In the first scenario, we analyze the Locator/Identifier Separation Protocol (LISP) as it is currently one of the strongest solutions to the semantic overload issue. However, its adoption is hindered by existing problems in the proposed mapping systems. Herein, we propose the LISP Redundancy Protocol (LRP) aimed to complement the LISP framework and strengthen feasibility of deployment, while at the same time, minimize mapping table size, latency time and maximize reachability in the network. In the second scenario, we explore TARIFA a Next Generation Internet architecture and introduce a novel service-centric addressing scheme which aims to overcome the issues related to routing and semantic overload of IP addresses.
A pesar de los numerosos esfuerzos de estandarización, los problemas de semántica continúan en efecto en muchas subáreas de networking. La inabilidad de intercambiar data sin ambiguedad entre sistemas es un problema que limita la interoperabilidad semántica. En esta tesis, abordamos los problemas de semántica en dos áreas: (i) la gestión de configuración y (ii) arquitecturas de direccionamiento. El hecho que hace el estudio en estas áreas de interés, es que los problemas de semántica datan desde los inicios del Internet. Sin embargo, mientras las redes continúan creciendo en tamaño y complejidad, los mecanismos desplegados dejan de ser escalabales y prácticos. Una de las tareas más complejas y esenciales en la gestión de redes es la configuración de equipos. La falta de mecanismos estándar para la modificación y control de la configuración de equipos ha llevado al uso continuado y extendido de interfaces por líneas de comando (CLI). Desafortunadamente, las CLIs son generalmente, específicos por fabricante y dispositivo. En el contexto de redes heterogéneas--es decir, redes típicamente compuestas por múltiples dispositivos de distintos fabricantes--el uso de varias CLIs trae consigo serios problemas de operación, administración y gestión. En consecuencia, los administradores de red se ven forzados a adquirir experiencia en el manejo específico de múltiples tecnologías y además, a mantenerse continuamente actualizados en la medida en que nuevas funcionalidades o tecnologías emergen, o bien con actualizaciones de sistemas operativos. En general, la utilización de mecanismos propietarios no permite compartir conocimientos de forma consistente a lo largo de plataformas heterogéneas, ni reutilizar configuraciones con el objetivo de alcanzar la completa automatización de tareas de configuración--que son típicamente requeridas en el área de gestión autonómica. Debido a esta heterogeneidad, las CLIs suelen proporcionar una función de ayuda que fundamentalmente aporta información para la interpretación semántica del entorno de configuración de un fabricante. La gran cantidad de información que un administrador debe aprender y manejar, hace de la extracción de información y otras formas de análisis de lenguaje natural del campo de Inteligencia Artificial, potenciales herramientas para la configuración de equipos en entornos heterogéneos. Esta tesis presenta el diseño y especificaciones de implementación del primer sistema de extracción de información basada en ontologías desde el CLI de dispositivos de red, para la automatización y abstracción de configuraciones. Por otra parte, la denominada sobrecarga semántica de direcciones IP--en donde, las direcciones son identificadores y localizadores al mismo tiempo--es una de las principales limitaciones sobre mobilidad, multi-homing y escalabilidad del sistema de enrutamiento. Por esta razón, numerosas propuestas han emergido en un esfuerzo por desacoplar la semántica del esquema de direccionamiento de las redes actuales. En esta tesis, abordamos este problema desde dos perspectivas, la primera de ellas una aproximación no-disruptiva (es decir, evolucionaria) al problema del Internet actual y la segunda, una nueva propuesta en torno a futuras arquitecturas del Internet. En el primer escenario, analizamos el protocolo LISP (del inglés, Locator/Identifier Separation Protocol) ya que es en efecto, una de las soluciones con mayor potencial para la resolucion del problema de semántica. Sin embargo, su adopción está limitada por problemas en los sistemas de mapeo propuestos. En esta tesis, proponemos LRP (del inglés, LISP Redundancy Protocol) un protocolo destinado a complementar LISP e incrementar la factibilidad de despliegue, a la vez que, reduce el tamaño de las tablas de mapeo, tiempo de latencia y maximiza accesibilidad. En el segundo escenario, exploramos TARIFA una arquitectura de red de nueva generación e introducimos un novedoso esquema de direccionamiento orientado a servicios.
APA, Harvard, Vancouver, ISO, and other styles
17

Lohmüller, Simon [Verfasser], and Bernhard [Akademischer Betreuer] Bauer. "Cognitive Self-Organizing Network Management for Automated Configuration of Self-Optimization SON Functions / Simon Lohmüller ; Betreuer: Bernhard Bauer." Augsburg : Universität Augsburg, 2019. http://d-nb.info/119169321X/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

Wong, Alfred Ka Yiu Computer Science &amp Engineering Faculty of Engineering UNSW. "Ontology mapping: a logic-based approach with applications in selected domains." Publisher:University of New South Wales. Computer Science & Engineering, 2008. http://handle.unsw.edu.au/1959.4/41103.

Full text
Abstract:
In advent of the Semantic Web and recent standardization efforts, Ontology has quickly become a popular and core semantic technology. Ontology is seen as a solution provider to knowledge based systems. It facilitates tasks such as knowledge sharing, reuse and intelligent processing by computer agents. A key problem addressed by Ontology is the semantic interoperability problem. Interoperability in general is a common problem in different domain applications and semantic interoperability is the hardest and an ongoing research problem. It is required for systems to exchange knowledge and having the meaning of the knowledge accurately and automatically interpreted by the receiving systems. The innovation is to allow knowledge to be consumed and used accurately in a way that is not foreseen by the original creator. While Ontology promotes semantic interoperability across systems by unifying their knowledge bases through consensual understanding, common engineering and processing practices, it does not solve the semantic interoperability problem at the global level. As individuals are increasingly empowered with tools, ontologies will eventually be created more easily and rapidly at a near individual scale. Global semantic interoperability between heterogeneous ontologies created by small groups of individuals will then be required. Ontology mapping is a mechanism for providing semantic bridges between ontologies. While ontology mapping promotes semantic interoperability across ontologies, it is seen as the solution provider to the global semantic interoperability problem. However, there is no single ontology mapping solution that caters for all problem scenarios. Different applications would require different mapping techniques. In this thesis, we analyze the relations between ontology, semantic interoperability and ontology mapping, and promote an ontology-based semantic interoperability solution. We propose a novel ontology mapping approach namely, OntoMogic. It is based on first order logic and model theory. OntoMogic supports approximate mapping and produces structures (approximate entity correspondence) that represent alignment results between concepts. OntoMogic has been implemented as a coherent system and is applied in different application scenarios. We present case studies in the network configuration, security intrusion detection and IT governance & compliance management domain. The full process of ontology engineering to mapping has been demonstrated to promote ontology-based semantic interoperability.
APA, Harvard, Vancouver, ISO, and other styles
19

Zhu, Yong. "Routing, Resource Allocation and Network Design for Overlay Networks." Diss., Georgia Institute of Technology, 2006. http://hdl.handle.net/1853/14017.

Full text
Abstract:
Overlay networks have been the subject of significant research and practical interest recently in addressing the inefficiency and ossification of the current Internet. In this thesis, we cover various aspects of overlay network design, including overlay routing algorithms, overlay network assignment and multihomed overlay networks. We also examine the behavior of overlay networks under a wide range of network settings and identify several key factors that affect the performance of overlay networks. Based on these findings, practical design guidelines are also given. Specifically, this thesis addresses the following problems: 1) Dynamic overlay routing: We perform an extensive simulation study to investigate the performance of available bandwidth-based dynamic overlay routing from three important aspects: efficiency, stability, and safety margin. Based on the findings, we propose a hybrid routing scheme that achieves good performance in all three aspects. We also examine the effects of several factors on overlay routing performance, including network load, traffic variability, link-state staleness, number of overlay hops, measurement errors, and native sharing effects. 2) Virtual network assignment: We investigate the virtual network (VN) assignment problem in the scenario of network virtualization. Specifically, we develop a basic VN assignment scheme without reconfiguration and use it as the building block for all other advanced algorithms. Subdividing heuristics and adaptive optimization strategies are presented to further improve the performance. We also develop a selective VN reconfiguration scheme that prioritizes the reconfiguration for the most critical VNs. 3) Overlay network configuration tool for PlanetLab: We develop NetFinder, an automatic overlay network configuration tool to efficiently allocate PlanetLab resources to individual overlays. NetFinder continuously monitors the resource utilization of PlanetLab and accepts a user-defined overlay topology as input and selects the set of PlanetLab nodes and their interconnection for the user overlay. 4) Multihomed overlay network: We examine the effectiveness of combining multihoming and overlay routing from the perspective of an overlay service provider (OSP). We focus on the corresponding design problem and examine, with realistic network performance and pricing data, whether the OSP can provide a network service that is profitable, better (in terms of round-trip time), and less expensive than the competing native ISPs.
APA, Harvard, Vancouver, ISO, and other styles
20

Suriano, Douglas A. "The design of a Local Area Network Configuration Management System for the Naval Postgraduate School Administrative Sciences Department." Thesis, Monterey, California. Naval Postgraduate School, 1989. http://hdl.handle.net/10945/25828.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Akkoc, Hasan. "A pro-active routing protocol for configuration of signaling channels in Server and Agent-based Active network Management (SAAM)." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2000. http://handle.dtic.mil/100.2/ADA379811.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Kalim, Umar. "Cognizant Networks: A Model and Framework for Session-based Communications and Adaptive Networking." Diss., Virginia Tech, 2017. http://hdl.handle.net/10919/87387.

Full text
Abstract:
The Internet has made tremendous progress since its inception. The kingpin has been the transmission control protocol (TCP), which supports a large fraction of communication. With the Internet's wide-spread access, users now have increased expectations. The demands have evolved to an extent which TCP was never designed to support. Since network stacks do not provide the necessary functionality for modern applications, developers are forced to implement them over and over again --- as part of the application or supporting libraries. Consequently, application developers not only bear the burden of developing application features but are also responsible for building networking libraries to support sophisticated scenarios. This leads to considerable duplication of effort. The challenge for TCP in supporting modern use cases is mostly due to limiting assumptions, simplistic communication abstractions, and (once expedient) implementation shortcuts. To further add to the complexity, the limited TCP options space is insufficient to support extensibility and thus, contemporary communication patterns. Some argue that radical changes are required to extend the networks functionality; some researchers believe that a clean slate approach is the only path forward. Others suggest that evolution of the network stack is necessary to ensure wider adoption --- by avoiding a flag day. In either case, we see that the proposed solutions have not been adopted by the community at large. This is perhaps because the cost of transition from the incumbent to the new technology outweighs the value offered. In some cases, the limited scope of the proposed solutions limit their value. In other cases, the lack of backward compatibility or significant porting effort precludes incremental adoption altogether. In this dissertation, we focus on the development of a communication model that explicitly acknowledges the context of the conversation and describes (much of) modern communications. We highlight how the communication stack should be able to discover, interact with and use available resources to compose richer communication constructs. The model is able to do so by using session, flow and endpoint abstractions to describe communications between two or more endpoints. These abstractions provide means to the application developers for setting up and manipulating constructs, while the ability to recognize change in the operating context and reconfigure the constructs allows applications to adapt to the changing requirements. The model considers two or more participants to be involved in the conversation and thus enables most modern communication patterns, which is in contrast with the well-established two-participant model. Our contributions also include an implementation of a framework that realizes such communication methods and enables future innovation. We substantiate our claims by demonstrating case studies where we use the proposed abstractions to highlight the gains. We also show how the proposed model may be implemented in a backwards compatible manner, such that it does not break legacy applications, network stacks, or middleboxes in the network infrastructure. We also present use cases to substantiate our claims about backwards compatibility. This establishes that incremental evolution is possible. We highlight the benefits of context awareness in setting up complex communication constructs by presenting use cases and their evaluation. Finally, we show how the communication model may open the door for new and richer communication patterns.
PHD
APA, Harvard, Vancouver, ISO, and other styles
23

Jonsson, Robin, and Simon Blixt. "Distribution and configuration of agents for NMS in a reasonable time." Thesis, Linnéuniversitetet, Institutionen för datavetenskap (DV), 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-29518.

Full text
Abstract:
With this paper we intended to simplify deployment and management of monitoring agents for a Network Monitoring System. We found interest on the subject since the time consumed to deploy and manage agents was found to be very inefficient. During a lecture with the Swedish based company Op5 AB at the Linnaeus University in Kalmar, Sweden, we presented the complex of problem. The lecturer showed great interest in a solution on the subject and we found it to be a great thesis subject for the Bachelor degree in Computer Science. By the year of 2016 it is expected that the number of network connected devices will grow threefold, there will be four times as much IP traffic and the data storage demand will increase tenfold. [8] This growing demand will also affect the requirement on the Network Monitoring System and in turn the monitoring agents. In this paper we created a baseline, which consisted of a timing regarding the time consumption for manual deployment, configuration and management of the monitoring agents. We also developed an automated way for deployment, configuration and management of monitoring agents by integrating a Content Management Software called Puppet, combined with several scripts. To simplify the management and deployment furthermore a widget was developed for Op5’s Web based User Interface called Ninja. The developed solution was measured against the baseline and a result regarding time consumption was presented. The result fell into a discussion on the subject of automatization and the time savings that it may result in due to less frequent human errors and a less repetitive work processes.
APA, Harvard, Vancouver, ISO, and other styles
24

Alves, Rodrigo Sanger. "Operações atômicas para gerenciamento baseado em políticas." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/11304.

Full text
Abstract:
Nesta dissertação é apresentada uma avaliação da viabilidade de obtenção de operações atômicas para a configuração de múltiplos dispositivos em uma rede de computadores. Em especial, é tratada a configuração de dispositivos a partir do gerenciamento baseado em políticas. Nestes casos, a necessidade de operações atômicas vem do fato de que uma aplicação de política que falha em um determinado dispositivo pode levar a um estado inconsistente em uma rede da qual se deseja um comportamento uniforme e global. Assim, este trabalho analisa requisitos, limitações, implicações e alternativas de implementação para a obtenção de atomicidade na aplicação de políticas. Como uma proposta de solução para este problema é definido um protocolo de consenso a ser utilizado entre os participantes da aplicação da política na rede. Tal protocolo é implementado utilizando Web Services e integrado junto ao sistema de gerenciamento baseado em políticas denominado QAME. Por fim, a solução é avaliada através de testes em um cenário de testes composto por um cluster de computadores.
This work presents an investigation of the viability of performing atomic operations during the configuration of multiple devices in a computer network. Specially, the configuration of devices using policy-based network management is addressed. In these cases, the need of atomic operations comes from the fact that a policy application that fails in a certain device can lead to an inconsistent state in a network from which an uniform and global behavior is desired. Thus, this work analyses requirements, limitations, implications, and alternatives for obtaining atomicity in policy deployment. As a solution for this problem, this work defines a consensus protocol to be used by the participants in the policy deployment process. Such protocol was implemented using Web Services and integrated to a policy-based network management system named QAME. At last, the proposed solution is evaluated through a set of tests performed over a testing scenario composed of a high-performance cluster.
APA, Harvard, Vancouver, ISO, and other styles
25

Lisbôa, Cléo Pagno. "Caracterização de novas interfaces de telecom a partir de interfaces e dispositivos gerenciáveis." reponame:Biblioteca Digital de Teses e Dissertações da UFRGS, 2007. http://hdl.handle.net/10183/14782.

Full text
Abstract:
Com o desenvolvimento das redes de telecomunicações e o crescimento da heterogeneidade dos elementos presentes nessas redes, a tarefa de desenvolver o suporte de novas interfaces nos sistemas de gerência de redes de telecom ficou bastante complicada, pois cada interface e dispositivo de rede possuem suas peculiaridades, características e configurações. Com o intuito de facilitar o monitoramento das novas interfaces de telecom nos sistemas de gerência de redes, esse trabalho visa identificar semelhanças entre as interfaces e dispositivos utilizados pelas operadoras de telecom no Brasil. O estudo foi realizado através de pesquisas junto a empresas que desenvolvem esses equipamentos, formando um grupo de objetos básicos para o suporte de novas tecnologias em telecom. Para facilitar essa pesquisa na busca das semelhanças entre as interfaces de telecom, foi desenvolvida a ferramenta Device Compare, que a partir de uma base de dados de um sistema de gerência de redes de telecom, compara duas interfaces apresentando as similaridades entre os objetos gerenciados, mostrando o tipo do objeto (se é um objeto monitorado de configuração ou de estado), e o protocolo de comunicação utilizado para recuperar a informação. A partir do resultado da pesquisa entre as interfaces de telecom utilizadas no Brasil e a comparação de objetos monitorados pelo sistema de gerência feito pela ferramenta Device Compare, foi desenvolvido um inventário de objetos presentes na maioria das interfaces de telecom que visa facilitar o monitoramento de novas interfaces nos sistemas de gerência, e, através do conhecimento de gerência das interfaces anteriores, criar o suporte para as novas interfaces e dispositivos que chegam ao mercado.
With the development of telecommunications networks and the different types of netwok components, the task of supporting new technologies in network management systems became too complicated, due to the fact that every interface and every network element has different atributes, characteristics and configurations. This work will identify similarities between devices and interfaces used by telecom providers in Brasil with the intention of facilitating the support of new technologies in network management systems. This research will be done on companies that develop this devices forming a basic set of objects to support new technologies. In order to find this similarities, we developed the Device Compare which is a tool that access a database of network management system, and compare two interfaces showing the similarities among the monitored objects, presenting the type of the object, i.e. it shows if the object is monitored to derive status or if it has to be configured, showing the communication protocol used to retrieve the information. From the result of this study on telecom interfaces used in Brasil and the comparation of objects monitored by the management system made by Device Compare tool we implemented a list with the most common objects in telecom interfaces. This list will be used to facilitate the support of new interfaces in management systems, and through the knowledge of old interfaces management, create the support to new interfaces and new devices that appear in the telecommunication market.
APA, Harvard, Vancouver, ISO, and other styles
26

Samuelsson, Peter. "Management of technology in the process industries: Matching market and machine." Doctoral thesis, KTH, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-199705.

Full text
Abstract:
The process industries span multiple industrial sectors and constitute a substantial part of the entire manufacturing industry. Since companies belonging to this family of industries are often very asset intensive, their ability to respond to changes is often limited in the short term. The adaptation of the capabilities of existing processes, and conversely finding products and market segments to match the production system capabilities, are an important part of product- and market development activities in the process industry. The importance to companies in the process industry of having a well-articulated manufacturing strategy congruent with the business strategy is second to none. However, to facilitate manufacturing strategy developments, it is essential to start with an improved characterization and understanding of the material transformation system. To that end an extensive set of variables was developed and related measures and scales were defined. The resulting configuration model, focusing on company generic process capabilities in the process industries, is to be regarded as a conceptual taxonomy and as a proposition available for further testing. The usability of the model was subsequently assessed using “mini-cases” in the forestry industry, where the respondents confirmed that the company’s overall strategy could benefit from this kind of platform as a possible avenue to follow. The model was deployed as an instrument in the profiling of company material transformation systems to facilitate the further development of companies' functional and business strategies. The use of company-generic production capabilities was studied in three case companies representing the mineral, food and steel industries. The model was found by the respondents to be usable as a knowledge platform to develop production strategies. In the final analysis of the research results, a new concept emerged called “production capability configuration": A process-industrial company’s alignment of its generic production capabilities in the areas of raw materials, process technology and products to improve the consistency among the variable elements that define operations and improve the congruence between operations and its environment. From the perspective of value creation and capture, firms must be able to manufacture products in a competitive cost structure within the framework of a proper business model. By using the configuration model, the relationship between manufacturing and innovation activities has been studied in the previously mentioned three case studies. In many cases the gap in capability appears as a limitation in the production system, requiring development efforts and sometimes investments to overcome. This is illustrated with two examples from the steel industry, where development efforts of the production system capabilities are initiated to better match the market demands. One example is the increase the volume- and product flexibility of an existing stainless steel melt shop, resulting in a proposed oblong Argon Oxygen Decarburisation (AOD) converter configuration that was subsequently verified using water modelling. The second example is from a carbon steel mill, where the target was to increase the raw material- and volume flexibility of another melt shop, by modifying the capabilities of the Electric Arc Furnace (EAF). Enabling EAF technologies are further described and evaluated using operational data and engineering type of estimates.

QC 20170116

APA, Harvard, Vancouver, ISO, and other styles
27

Habib, Farooq. "Interplay between network configurations and network governance mechanisms in supply networks a systematic literature review." Thesis, Cranfield University, 2012. http://dspace.lib.cranfield.ac.uk/handle/1826/7879.

Full text
Abstract:
Purpose: This work systematically reviews the extant academic management literature on supply networks. It specifically examines how network configurations and network governance mechanisms influence each other in supply networks. Design: 125 analytical and empirical studies were identified using an evidence-based approach to review the literature mainly published between 1985 and 2012. Synthesis: Drawing on a multi-disciplinary theoretical foundation, this work develops an integrative framework to identify three distinct yet interdependent themes that characterize the study of supply networks: a) Network Configurations (structures and relationships); b) Network Governance Mechanisms (formal and informal); and c) The Interplay between Network Configurations and Network Governance Mechanisms. Findings: Network configurations and network governance mechanisms mutually influence each other and cannot be considered in isolation. Formal and informal governance mechanisms provide better control when used as complements rather than as substitutes. The choice of governance mechanism depends on the nature of exchange; role of management; desired level of control; level of flexibility in formal contracts; and complementary role of formal and informal governance mechanism. Research implications: This nascent field has thematic and methodological research opportunities for academics. Comparative network analysis using longitudinal case studies offers a rich area for further study. Practical Implications: The complexity surrounding the conflicting roles of managers at the organisation and network levels poses a significant challenge during the development and implementation stage of strategic network policies. Originality/value: This review reveals that formal and informal governance mechanisms provide better control when used as complements rather than as substitutes.
APA, Harvard, Vancouver, ISO, and other styles
28

Kim, Min Young. "Configuration and management of wireless sensor networks. /." Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2005. http://library.nps.navy.mil/uhtbin/hyperion/05Dec%5FKim%5FMin.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, December 2005.
Thesis Advisor(s): Gurminder Singh, Arijit Das. Includes bibliographical references (p. 127-129). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
29

Kim, Min Y. "Configuration and management of wireless sensor networks." Thesis, Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/1763.

Full text
Abstract:
Wireless sensor networks (WSNs) are expected to play an essential role in the upcoming age of pervasive computing. As a new research area, there are several open problems that need to be investigated. One such problem is configuration and management of WSNs. To deploy sensors efficiently in a wide area, we need to consider coverage, purpose and geographic situation. By considering these elements, we can make general deployment strategies. Another issue is management of various sensors in wide area. To handle these issues, we need approaches from different view, management levels, WSN functionalities, and management functional areas. In this thesis, I describe some of the key configuration and management problems in WSNs. Then, I present a newly developed application to address these problems.
APA, Harvard, Vancouver, ISO, and other styles
30

Sardara, Mauro. "Towards a scalable and programmable incremental deployment of ICN in the real world." Electronic Thesis or Diss., Université Paris-Saclay (ComUE), 2019. http://www.theses.fr/2019SACLT042.

Full text
Abstract:
Réseau centré sur l’information (ICN) englobe une famille de réseaux architectures repensant les principes de communication Internet autour des données nommées. Après plusieurs années de recherche et l’émergence de quelques propositions populaires, l’idée de remplacer TCP / IP par un réseau centré sur les données reste débattue. Les avantages du ICN ont été préconisés dans le contexte des réseaux 5G pour la prise en charge de schémas de communication minimaux hautement mobiles, à accès multiples / source et à latence. Toutefois, des tests à grande échelle et une insertion dans des réseaux opérationnels doivent encore être réalisés, probablement en raison de l'absence d'une stratégie de déploiement incrémental claire. L'objectif de cette thèse est de proposer et d'évaluer des solutions efficaces pour le déploiement de l'ICN. Tout d'abord, nous proposons Hybrid-ICN (hICN), une intégration ICN dans IP (plutôt que sur / sous / à la place de) qui a pour ambition de ne pas échanger les principes architecturaux ICN. En réutilisant les formats de paquets existants, hICN introduit de l'innovation au sein de la pile IP, nécessitant un minimum de mises à niveau logicielles et garantissant une interconnexion transparente avec les réseaux IP existants. Deuxièmement, la thèse est centrée sur le problème du déploiement de l'ICN aux extrémités du réseau, notamment l'hôte final, en concevant une infrastructure de transport et une API de socket pouvant être utilisées dans plusieurs architectures ICN telles que NDN, CCN et hICN. Le cadre favorise les technologies de pointe visant à fournir des performances et une efficacité aux applications. Une analyse comparative détaillée à la fin du chapitre présentera les performances du cadre de transport. Ensuite, les avantages que les services de transport et de réseau hICN peuvent apporter aux applications seront évalués en considérant deux principaux cas d'utilisation: HTTP et WebRTC. Le premier représente le protocole de facto du Web, tandis que le second est une nouvelle technologie émergente de plus en plus adoptée pour les services en temps réel. Enfin, la thèse propose une solution pour déployer par programmation, configuration et gestion des réseaux et des applications ICN: Virtualized ICN (vICN), un cadre unifié programmable pour la configuration et la gestion de réseau qui utilise les progrès récents en matière d’isolement des ressources et de techniques de virtualisation. Il offre une plate-forme unique, flexible et évolutive pour répondre à différents objectifs, en particulier les déploiements réels de l'ICN dans les réseaux IP existants
Information-Centric Networking (ICN) embraces a family of network architectures rethinking Internet communication principles around named-data. After several years of research and the emergence of a few popular proposals, the idea to replace TCP/IP with data-centric networking remains a subject of debate. ICN advantages have been advocated in the context of 5G networks for the support of highly mobile, multi-access/source and latency minimal patterns of communications. However, large-scale testing and insertion in operational networks are yet to happen, likely due to the lack of a clear incremental deployment strategy. The aim of this thesis is to propose and evaluate effective solutions for deploying ICN. Firstly, we propose Hybrid-ICN (hICN), an ICN integration inside IP (rather that over/ under/ in place of) that has the ambition to trade-off no ICN architectural principles. By reusing existing packet formats, hICN brings innovation inside the IP stack, requiring minimal software upgrades and guaranteeing transparent interconnection with existing IP networks. Secondly, the thesis focuses on the problem of deploying ICN at the network endpoints, namely at the end host, by designing a transport framework and a socket API that can be used in several ICN architectures such as NDN, CCN and hICN. The framework fosters cutting-edge technologies aiming at providing performance and efficiency to applications. An extensive benchmarking at the end of the chapter will present the performance of the transport framework. Subsequently, the benefits that hICN network and transport services can bring to applications will be assessed, by considering two main use cases: HTTP and WebRTC. The former represents the de-facto protocol of the Web, while the latter is a new emerging technology increasingly adopted for real time services. At last, the thesis proposes a solution for programmatically deploying, configuring and managing ICN networks and applications: Virtualized ICN (vICN), a programmable unified framework for network configuration and management that uses recent progresses in resource isolation and virtualization techniques. It offers a single, flexible and scalable platform to serve different purposes, in particular the real deployments of ICN in existing IP networks
APA, Harvard, Vancouver, ISO, and other styles
31

Atoui, Wassim Sellil. "Toward auto-configuration in software networks." Electronic Thesis or Diss., Institut polytechnique de Paris, 2020. http://www.theses.fr/2020IPPAS015.

Full text
Abstract:
Les réseaux logiciels ont le potentiel de porter l'infrastructure réseau à un niveau plus avancé, un niveau qui peut rendre la configuration autonome. Cette capacité peut surmonter la complexité croissante des réseaux actuels et permettre aux entités de gestion d'activer un comportement efficace dans le réseau pour une amélioration globale des performances sans aucune intervention humaine. Les paramètres de configuration peuvent être sélectionnés automatiquement pour les ressources réseau afin de faire face à diverses situations que les réseaux rencontrent, comme les erreurs et la dégradation des performances. Malheureusement, certains défis doivent être relevés pour atteindre ce niveau avancé de réseaux. Actuellement, la configuration est encore souvent générée manuellement par des experts du domaine dans d'énormes fichiers semi-structurés écrits en XML, JSON et YAML. C'est une tâche complexe, sujette aux erreurs et fastidieuse à accomplir par les humains. De plus, il n'y a pas de stratégie formelle, à part l'expérience et les meilleures pratiques des experts du domaine pour concevoir les fichiers de configuration. Différents experts peuvent choisir une configuration différente pour le même objectif de performances. Cette situation rend plus difficile l'extraction des fonctionnalités des fichiers de configuration et l'apprentissage des modèles susceptibles de générer ou de recommander automatiquement la configuration. De plus, il n'y a toujours pas de consensus sur un modèle de données de configuration commun dans les réseaux logiciels, qui a abouti à des solutions hétérogènes, telles que: TOSCA, YANG, Hot, etc. qui rendent la gestion de réseau de bout en bout difficile. Dans cette thèse, nous présentons nos contributions qui abordent les défis susmentionnés liés à l'automatisation de la configuration dans les réseaux logiciels. Pour aborder le problème de l'hétérogénéité entre les fichiers de configuration, nous proposons un cadre sémantique basé sur des ontologies qui peuvent fédérer des éléments communs à partir de différents fichiers de configuration
Software networks have the potential to take the network infrastructure to a more advanced level, a level that can make the configuration autonomic. This ability can overcome the rapidly growing complexity of current networks, and allow management entities to enable an effective behavior in the network for overall performance improvement without any human intervention. Configuration parameters can be automatically selected for network resources to cope with various situations that networks encounter like errors and performance degradation. Unfortunately, some challenges need to be tackled to reach that advanced level of networks. Currently, the configuration is still often generated manually by domain experts in huge semi-structured files written in XML, JSON, and YAML. This is a complex, error-prone, and tedious task to do by humans. Also, there is no formal strategy except experience and best practices of domain experts to design the configuration files. Different experts may choose different configurations for the same performance goal. This situation makes it harder to extract features from the configuration files and learn models that could generate or recommend automatic configuration. Moreover, there is still no consensus on a common configuration data model in software networks, which resulted in heterogeneous solutions, such as TOSCA, YANG, Hot, etc. that make the end-to-end network management difficult. In this thesis, we present our contributions that tackle the aforementioned challenges related to automating the configuration in software networks. To tack the problem of heterogeneity between the configuration files we propose a semantic framework based ontologies that can federate common elements from different configuration files. And, to tackle the problem of generating automatically the configuration, we propose two contributions, one contribution that considers deep neural networks to learn from configuration files models for recommending the configuration and another contribution based on a model-driven approach to assist automatically the design of the configuration files
APA, Harvard, Vancouver, ISO, and other styles
32

Kudláček, Marek. "Systém pro správu a monitoring PC." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-316966.

Full text
Abstract:
This master's thesis deals with a system for PC mass management and monitoring. There is a brief description of Puppet, Chef and Ansible, which are tools enabling this functionality. The overall system issues are solved by Ansible. This thesis also includes a script created for a classroom’s remote management according to a beforehand fixed assignment. The system enables remote installation and configuration of applications, creation of users, editing the files, update of the system and many more. A web application was created for this system. Through this application, the system can be controlled via web browser, both from local and public network. Practical examples of the issue dealt with is also part of the thesis.
APA, Harvard, Vancouver, ISO, and other styles
33

El, Kaed Charbel. "Home Devices Mediation using ontology alignment and code generation techniques." Thesis, Grenoble, 2012. http://www.theses.fr/2012GRENM002/document.

Full text
Abstract:
Les protocoles plug-and-play couplés avec les architectures logicielles rendent nos maisons ubiquitaires. Les équipements domestiques qui supportent ces protocoles peuvent être détectés automatiquement, configurés et invoqués pour une tâche donnée. Actuellement, plusieurs protocoles coexistent dans la maison, mais les interactions entre les dispositifs ne peuvent pas être mises en action à moins que les appareils supportent le même protocole. En plus, les applications qui orchestrent ces dispositifs doivent connaître à l'avance les noms des services et dispositifs. Or, chaque protocole définit un profil standard par type d'appareil. Par conséquent, deux appareils ayant le même type et les mêmes fonctions mais qui supportent un protocole différent publient des interfaces qui sont souvent sémantiquement équivalentes mais syntaxiquement différentes. Ceci limite alors les applications à interagir avec un service similaire. Dans ce travail, nous présentons une méthode qui se base sur l'alignement d'ontologie et la génération automatique de mandataire pour parvenir à une adaptation dynamique de services
Ubiquitous systems imagined by Mark Weiser are emerging thanks to the development of embedded systems and plug-n-play protocols like the Universal Plug aNd Play (UPnP), the Intelligent Grouping and Resource Sharing (IGRS), the Device Pro le for Web Services (DPWS) and Apple Bonjour. Such protocols follow the service oriented architecture (SOA) paradigm and allow an automatic device and service discovery in a home network. Once devices are connected to the local network, applications deployed for example on a smart phone, a PC or a home gateway, discover the plug-n-play devices and act as control points. The aim of such applications is to orchestrate the interactions between the devices such as lights, TVs and printers, and their corresponding hosted services to accomplish a specific human daily task like printing a document or dimming a light. Devices supporting a plug-n-play protocol announce their hosted services each in its own description format and data content. Even similar devices supporting the same services represent their capabilities in a different representation format and content. Such heterogeneity along with the protocols layers diversity, prevent applications to use any available equivalent device on the network to accomplish a specific task. For instance, a UPnP printing application cannot interacts with an available DPWS printer on the network to print a document. Designing applications to support multiple protocols is time consuming since developers must implement the interaction with each device pro le and its own data description. Additionally, the deployed application must use multiple protocols stacks to interact with the device. More over, application vendors and telecoms operators need to orchestrate devices through a common application layer, independently from the protocol layers and the device description. To accomplish interoperability between plug-n-play devices and applications, we propose a generic approach which consists in automatically generating proxies based on an ontology alignment. The alignment contains the correspondences between two equivalent devices descriptions. Such correspondences actually represent the proxy behaviour which is used to provide interoperability between an application and a plug and play device. For instance, the generated proxy will announce itself on the network as a UPnP standard printer and will control the DPWS printer. Consequently, the UPnP printing application will interact transparently with the generated proxy which adapts and transfers the invocations to the real DPWS printer. We implemented a prototype as a proof of concept that we evaluated on several real UPnP and DPWS equivalent devices
APA, Harvard, Vancouver, ISO, and other styles
34

Chen, Huoping. "Self-Configuration Framework for Networked Systems and Applications." Diss., The University of Arizona, 2008. http://hdl.handle.net/10150/195456.

Full text
Abstract:
The increased complexity, heterogeneity and the dynamism of networked systems and applications make current configuration and management tools to be ineffective. A new paradigm to dynamically configure and manage large-scale complex and heterogeneous networked systems is critically needed. In this dissertation, we present a self configuration paradigm based on the principles of autonomic computing that can handle efficiently complexity, dynamism and uncertainty in configuring networked systems and their applications. Our approach is based on making any resource/application to operate as an Autonomic Component (that means, it can be self-configured, self-healed, self-optimized and self-protected) by using two software modules: Component Management Interface (CMI) to specify the configuration and operational policies associated with each component and Component Runtime Manager (CRM) that manages the component configurations and operations using the policies defined in CMI. We use several configuration metrics (adaptability, complexity, latency, scalability, overhead, and effectiveness) to evaluate the effectiveness of our self-configuration approach when compared to other configuration techniques. We have used our approach to dynamically configure four systems: Automatic IT system management, Dynamic security configuration of networked systems, Self-management of data backup and disaster recovery system and Automatic security patches download and installation on a large scale test bed. Our experimental results showed that by applying our self-configuration approach, the initial configuration time, the initial configuration complexity and the dynamic configuration complexity can be reduced significantly. For example, the configuration time for security patches download and installation on nine machines is reduced to 4399 seconds from 27193 seconds. Furthermore our system provides most adaptability (e.g., 100% for Snort rule set configuration) comparing to hard coded approach (e.g., 22% for Snort rule set configuration) and can improve the performance of managed system greatly. For example, in data backup and recovery system, our approach can reduce the total cost by 54.1% when network bandwidth decreases. In addition, our framework is scalable and imposes very small overhead (less than 1%) on the managed system.
APA, Harvard, Vancouver, ISO, and other styles
35

El, kaed Charbel. "La médiation d'interaction entre les équipements domestiques basés sur l'alignement d'ontologies et la génération du code." Phd thesis, Université de Grenoble, 2012. http://tel.archives-ouvertes.fr/tel-00680022.

Full text
Abstract:
Les protocoles plug-and-play couplés avec les architectures logicielles rendent nos maisons ubiquitaires. Les équipements domestiques qui supportent ces protocoles peuvent être détectés automatiquement, configurés et invoqués pour une tâche donnée. Actuellement, plusieurs protocoles coexistent dans la maison, mais les interactions entre les dispositifs ne peuvent pas être mises en action à moins que les appareils supportent le même protocole. En plus, les applications qui orchestrent ces dispositifs doivent connaître à l'avance les noms des services et dispositifs. Or, chaque protocole définit un profil standard par type d'appareil. Par conséquent, deux appareils ayant le même type et les mêmes fonctions mais qui supportent un protocole différent publient des interfaces qui sont souvent sémantiquement équivalentes mais syntaxiquement différentes. Ceci limite alors les applications à interagir avec un service similaire. Dans ce travail, nous présentons une méthode qui se base sur l'alignement d'ontologie et la génération automatique de mandataire pour parvenir à une adaptation dynamique de services.
APA, Harvard, Vancouver, ISO, and other styles
36

Lacerda, Fabrizzio Cabral de. "Uma proposta de arquitetura para o protocolo NETCONF sobre SOAP." [s.n.], 2007. http://repositorio.unicamp.br/jspui/handle/REPOSIP/259627.

Full text
Abstract:
Orientador: Mauricio Ferreira Magalhães
Dissertação (mestrado) - Universidade Estadual de Campinas, Faculdade de Engenharia Eletrica e de Computação
Made available in DSpace on 2018-08-10T08:14:26Z (GMT). No. of bitstreams: 1 Lacerda_FabrizzioCabralde_M.pdf: 1883686 bytes, checksum: c6ae7f1ec9d40594dd97e011ec07e59b (MD5) Previous issue date: 2007
Resumo: A gerência de redes é formada por cinco áreas funcionais: Falha, Configuração, Contabilidade, Desempenho e Segurança. A área de configuração é responsável pela operação e manutenção da rede, acompanhando as mudanças de configuração realizadas em cada dispositivo da rede. As principais ferramentas de gerência disponíveis, CLI e SNMP, não atendem aos requisitos de configurações das redes atuais. Novas tecnologias Web estão se tornando comuns na gerência de redes, com destaque para o uso da linguagem XML e do protocolo HTTP. Com o objetivo de aplicar estas novas tecnologias na configuração de redes foi definido, no âmbito do IETF, um novo protocolo de gerência de configuração denominado NETCONF. Este trabalho faz um estudo do protocolo NETCONF procurando destacar as suas vantagens e limitações. Este trabalho propõe, também, uma arquitetura de implementação para o NETCONF baseada no protocolo de transporte SOAP sobre HTTP, ou sobre HTTPs. Com o objetivo de validar a arquitetura, apresentamos a implementação de um protótipo totalmente aderente à proposta NETCONF para o qual foi especificado um modelo de dados para configuração de VLANs de switches de fabricantes diferentes
Abstract: Network management is formed by five functional areas: Failure, Configuration, Accounting, Performance and Security. The configuration area is responsible for the network¿s operation and maintenance, following the configuration changes done in each network¿s device. The main management tools available, CLI and SNMP, do not take care of the configuration requirements of current networks. New Web technologies are becoming widespread in network management, with prominence of XML language and HTTP protocol. A new protocol of configuration management named NETCONF has been defined, in the scope of the IETF, in order to apply these new technologies for configuration of networks. This work studies the NETCONF protocol aiming to highlight its advantages and limitations. This work also proposes an architecture of implementation for the NETCONF based on the transport protocol SOAP over HTTP, or HTTPs. Aiming to validate such architecture, we present the implementation of a prototype fully adherent to the NETCONF proposal, for which it has specified a model of data for configuration of VLANs of switches from different manufacturers
Mestrado
Engenharia de Computação
Mestre em Engenharia Elétrica
APA, Harvard, Vancouver, ISO, and other styles
37

Barrère, Cambrún Martín. "Vulnerability management for safe configurations in autonomic networks and systems." Thesis, Université de Lorraine, 2014. http://www.theses.fr/2014LORR0048/document.

Full text
Abstract:
Le déploiement d'équipements informatiques à large échelle, sur les multiples infrastructures interconnectées de l'Internet, a eu un impact considérable sur la complexité de la tâche de gestion. L'informatique autonome permet de faire face à cet enjeu en spécifiant des objectifs de haut niveau et en déléguant les activités de gestion aux réseaux et systèmes eux-mêmes. Cependant, lorsque des changements sont opérés par les administrateurs ou par les équipements autonomes, des configurations vulnérables peuvent être involontairement introduites. Ces vulnérabilités offrent un point d'entrée pour des attaques de sécurité. À cet égard, les mécanismes de gestion des vulnérabilités sont essentiels pour assurer une configuration sûre de ces environnements. Cette thèse porte sur la conception et le développement de nouvelles méthodes et techniques pour la gestion des vulnérabilités dans les réseaux et systèmes autonomes, afin de leur permettre de détecter et de corriger leurs propres expositions aux failles de sécurité. Nous présenterons tout d'abord un état de l'art sur l'informatique autonome et la gestion de vulnérabilités. Nous décrirons ensuite notre approche d'intégration du processus de gestion des vulnérabilités dans ces environnements, et en détaillerons les différentes facettes, notamment : extension de l'approche dans le cas de vulnérabilités distribuées, prise en compte du facteur temps en considérant une historisation des paramètres de configuration, et application en environnements contraints en utilisant des techniques probabilistes. Nous présenterons également les prototypes et les résultats expérimentaux qui ont permis d'évaluer ces différentes contributions
Over the last years, the massive deployment of computing devices over disparate interconnected infrastructures has dramatically increased the complexity of network management. Autonomic computing has emerged as a novel paradigm to cope with this challenging reality. By specifying high-level objectives, autonomic computing aims at delegating management activities to the networks themselves. However, when changes are performed by administrators and self-governed entities, vulnerable configurations may be unknowingly introduced. Nowadays, vulnerabilities constitute the main entry point for security attacks. Therefore, vulnerability management mechanisms are vital to ensure safe configurations, and with them, the survivability of any autonomic environment. This thesis targets the design and development of novel autonomous mechanisms for dealing with vulnerabilities, in order to increase the security of autonomic networks and systems. We first present a comprehensive state of the art in autonomic computing and vulnerability management. Afterwards, we present our contributions which include autonomic assessment strategies for device-based vulnerabilities and extensions in several dimensions, namely, distributed vulnerabilities (spatial), past hidden vulnerable states (temporal), and mobile security assessment (technological). In addition, we present vulnerability remediation approaches able to autonomously bring networks and systems into secure states. The scientific approaches presented in this thesis have been largely validated by an extensive set of experiments which are also discussed in this manuscript
APA, Harvard, Vancouver, ISO, and other styles
38

Abdeljaouad, Imad. "Self-Configuration and Monitoring of Service Specific Overlay Networks." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/23960.

Full text
Abstract:
The constant growth in network communications technologies and the emergence of Service Specific Overlay Networks (SSONs), coupled with the rapid development of multimedia applications make the management of such technologies a major challenge. This thesis investigates the SSONs management problem and proposes an autonomic architecture, a self-organizing and self-adapting algorithm, and a utility function for monitoring the Quality of Experience (QoE) of IPTV streams in SSONs. First, we examine the different issues stemming from the autonomic management of SSONs and identify the limitations of existing approaches. We then propose an architecture to ease the management of SSONs by incorporating autonomic computing principles to make SSONs acquire self-management capabilities. The proposed architecture introduces autonomic control loops that continuously monitor network components and analyze the gathered data. An Autonomic System (AS) is comprised of one or more Autonomic Managers (AM) which take control of managing other elements in the network. The proposed architecture highlights the different components of an AM and identifies its purpose. The distributed nature of the proposed architecture avoids limitations of centralized management solutions. We then propose a scheme to allow AMs to emerge among the set of nodes in the network as the most powerful ones in terms of different factors, including processing capabilities and stability. Using a self-organizing and self-adapting distributed protocol, each node in the overlay selects an appropriate AM to report to so that sensed data is delivered error-free, and in a timely manner, while the load is distributed over the AMs. Finally, we propose a utility function to monitor the quality of IPTV streams by predicting QoE based on statistical Quality of Service (QoS) information. The proposed function is simple and does not require high processing power. It allows the QoE of IPTV users to be monitored in real-time by the AMs, so that quality degradations are accurately identified and adaptation mechanisms are triggered at the right moment to correct issues causing degradations. Theoretical analysis and simulations studies are presented to demonstrate the performance of the proposed schemes.
APA, Harvard, Vancouver, ISO, and other styles
39

Cano, Reyes José. "Integrated Architecture for Configuration and Service Management in MANET Environments." Doctoral thesis, Universitat Politècnica de València, 2012. http://hdl.handle.net/10251/14675.

Full text
Abstract:
Esta tesis nos ha permitido trasladar algunos conceptos teóricos de la computación ubicua a escenarios reales, identificando las necesidades específicas de diferentes tipos de aplicaciones. Con el fin de alcanzar este objetivo, proponemos dos prototipos que proporcionan servicios sensibles al contexto en diferentes entornos, tales como conferencias o salas de recuperación en hospitales. Estos prototipos experimentales explotan la tecnología Bluetooth para ofrecer información basada en las preferencias del usuario. En ambos casos, hemos llevado a cabo algunos experimentos con el fin de evaluar el comportamiento de los sistemas y su rendimento. También abordamos en esta tesis el problema de la autoconfiguración de redes MANET basadas en el estándar 802.11 a través de dos soluciones novedosas. La primera es una solución centralizada que se basa en la tecnología Bluetooth, mientras la segunda es una solución distribuida que no necesita recurrir a ninguna tecnología adicional, ya que se basa en el uso del parámetro SSID. Ambos métodos se han diseñado para permitir que usuarios no expertos puedan unirse a una red MANET de forma transparente, proporcionando una configuración automática, rápida, y fiable de los terminales. Los resultados experimentales en implementaciones reales nos han permitido evaluar el rendimiento de las soluciones propuestas y demostrar que las estaciones cercanas se pueden configurar en pocos segundos. Además, hemos comparado ambas soluciones entre sí para poner de manifiesto las diferentes ventajas y desventajas en cuanto a rendimento. La principal contribución de esta tesis es EasyMANET, una plataforma ampliable y configurable cuyo objetivo es automatizar lo máximo posible las tareas que afectan a la configuración y puesta en marcha de redes MANET, de modo que su uso sea más simple y accesible.
Cano Reyes, J. (2012). Integrated Architecture for Configuration and Service Management in MANET Environments [Tesis doctoral no publicada]. Universitat Politècnica de València. https://doi.org/10.4995/Thesis/10251/14675
Palancia
APA, Harvard, Vancouver, ISO, and other styles
40

Dickison, David G. "Implementation of a configuration and maintenance management system for Local Area Networks." Thesis, Monterey, California. Naval Postgraduate School, 1992. http://hdl.handle.net/10945/23698.

Full text
Abstract:
The management of Local Area Networks today is one of the most challenging tasks which face a system manager. The plethora of system software, application software and accessories available combined with the various computer clones, and open architecture present in microcomputers makes tracking Local Area Network configuration and maintenance a very daunting task. This thesis modifies a previous design for a Local Area Network configuration and maintenance database and implements the new design in Dbase IV version 1.1 using the Naval Postgraduate School Administrative Science Department Local Area Networks as a prototype database. The database was designed to be simple to use, to protect data integrity and to be expandable to new equipment, new technology and new data applications. Due to its general nature, the Local Area Network Maintenance and Configuration System can be used on virtually any Local Area Network application. LAN, Database, LAN Management, Configuration management
APA, Harvard, Vancouver, ISO, and other styles
41

Parthasarathy, Rashmi. "Robust dynamic reprogramming of wireless sensor networks." Pullman, Wash. : Washington State University, 2009. http://www.dissertations.wsu.edu/Thesis/Fall2009/r_parthasarathy_112309.pdf.

Full text
Abstract:
Thesis (M.S. in computer science)--Washington State University, December 2009.
Title from PDF title page (viewed on Jan. 20, 2010). "School of Electrical Engineering and Computer Science." Includes bibliographical references (p. 60-64).
APA, Harvard, Vancouver, ISO, and other styles
42

Barman, Dhiman. "Challenges in security and traffic management in enterprise networks /." Diss., [Riverside, Calif.] : University of California, Riverside, 2008. http://proquest.umi.com/pqdweb?index=0&did=1663077951&SrchMode=2&sid=1&Fmt=6&VInst=PROD&VType=PQD&RQT=309&VName=PQD&TS=1265217163&clientId=48051.

Full text
Abstract:
Thesis (Ph. D.)--University of California, Riverside, 2008.
Includes abstract. Title from first page of PDF file (viewed February 3, 2010). Available via ProQuest Digital Dissertations. Includes bibliographical references (p. 122-129). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
43

Hughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.
Software often requires patches to be installed post-implementation for a variety of reasons. Organisations and individuals, however, do not always promptly install these patches as and when they are released. This study investigated the reasons for the delay or hesitation, identified the challenges, and proposed a model that could assist organisations in overcoming the identified challenges. The research investigated the extent to which the integration of software patch management and enterprise data security is an important management responsibility, by reviewing relevant documents and interviewing key role players currently involved in the patch management process. The current challenges and complexities involved in patch management at an enterprise level could place organisations at risk by compromising their enterprise-data security. This research primarily sought to identify the challenges causing the management of software patches to be complex, and further attempted to establish how organisations currently implement patch management. The aim of the study was to explore the complexities of software patch management in order to enhance enterprise data security within organisations. A single case study was used, and data were obtained from primary sources and literature. The study considered both technological and human factors, and found that both factors play an equally important role with regard to the successful implementation of a patch management program within an organisation.
APA, Harvard, Vancouver, ISO, and other styles
44

Behrens, Roger. "Matching networks to needs : travel needs and the configuration and management of local movement networks in South African cities." Doctoral thesis, Faculty of Engineering and the Built Environment, 2002. http://hdl.handle.net/11427/30500.

Full text
Abstract:
Motivated by disquiet that walking, as both a travel mode and as a segment of public transport trips, is not accommodated well in South African cities, this dissertation has two central aims. The first is to understand better the need for travel by non-motorised modes and within local areas. The second is to contribute to the improvement of local area movement network configuration and management practices. The research is primarily exploratory in nature and was conducted within a 'critical social science' paradigm-in which the research process was driven by a series of questions regarding the critical interrogation of these practices. It explores some of the implications for practice of a post-apartheid urban transport policy discourse that prioritises understanding travel need, managing road space, and accommodating public transport users and pedestrians. Reviews of literature, examination of codes of practice, and interviews with practitioners were conducted to trace the origins and nature of practices in the fields of travel analysis and local network planning and to investigate evidence of relationships between local network planning practices and improved local travel conditions. A household travel survey was administered in metropolitan Cape Town to gather data on travel behaviour across various income bands and in different residential locations. The survey employed an innovative activity-based method, with theoretical origins in time geography. With the use of computer-assisted personal interviewing technology, it involved members of 204 households recording their activity schedule over a 24-hour period. The data were analysed using conventional methods of filtered cross-tabulation, as well as time-space instruments. The research found, inter alia, that as a result of being routinely excluded or underestimated in past surveys, the importance of walking has not been fully understood. Walking would appear to be particularly important in satisfying the travel needs of middle-and low-income households, and walking distance findings would appear to refute assumptions regarding the introverted nature of pedestrian trips that underlie conventional local network configuration practices. In the light of these and other findings the dissertation argues for functionally 'fuzzy' local networks within which pedestrians and cyclists are accommodated on 'permeable' networks of footways, pathways, cycleways and shared roadways, while motor cars are accommodated on variously discontinuous roadway networks. The dissertation also argues for the strategic identification of local areas requiring priority attention, and the preparation of integrated local area plans incorporating co-ordinated and proactive pedestrian planning, bicycle planning and traffic calming.
APA, Harvard, Vancouver, ISO, and other styles
45

Diaz, Garcia J. Adrian. "Network analysis of technical and organizational configurations : using an alignment approach to enhance product development performance." Thesis, Massachusetts Institute of Technology, 2009. http://hdl.handle.net/1721.1/47856.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program, 2009.
Includes bibliographical references (p. 203-212).
In an attempt to improve their Product Development Processes (PDPs), many companies make considerable investments to have available cutting-edge technology such as virtual tools. While some companies have increased their productivity and time to market with them, some others have not. There seem to be fundamental factors above and beyond the use of these tools that can obstruct the PDP and one of them appears to be the misalignment between the product architecture and the organizational interactions of the actors working on it. While there has been significant work addressing the technical and social concerns of a PDP independently, the nature of the misalignment requires an integrated analysis of the product architecture and the organization. The present work studies them in an integrated approach by making use of network analyses. The research for this thesis was conducted in a Global Product Development (GPD) project of an automotive manufacturer. By first using as a reference the Multidisciplinary System Design Optimization (MSDO) to decompose the architecture of a product and then, using a specific type of Design Structure Matrix (DSM) [43] called N2 Diagram to identify the interfaces of the architecture, a network called theoretical sociogram was created. In addition, the relative sensitivity of some objectives describing the functioning of the product's systems was calculated to classify the strength of the ties in two levels: strong for those above an absolute relative sensitivity of 0.5, and weak for those with an absolute relative sensitivity lower or equal than 0.5.
(cont.) Furthermore, through surveys and interviews, the organizational interactions for two different phases of the project were mapped to construct a new set of networks called actual sociograms. By comparing the sociograms and utilizing metrics that deal with the centrality of the actors in the network, the misalignments were identified. The misalignments provided guidance to identify the enablers and obstacles influencing the PDP. It was observed that, in some cases, when the sensitivity among variables was weak, engineering teams tend to use intermediaries to share information. In some other circumstances the direct interaction doesn't occur, due to reasons including cultural aspects, complexity of the information, the way the information is structured and organizational fuzziness, among others. Based on these findings, some recommendations based on literature review, lessons learned from other industries and conversations with Product Development (PD) actors, are provided.
by J. Adrian Diaz Garcia.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
46

Kelly, Amanda M., and Vanessa P. Ambers. "Installation, configuration and operational testing of a PKI certificate server and its supporting services." Thesis, Monterey California. Naval Postgraduate School, 2004. http://hdl.handle.net/10945/1615.

Full text
Abstract:
Approved for public release; distribution is unlimited
Public key infrastructure (PKI) was created to provide the basic services of confidentiality, authenticity, integrity and non-repudiation for sensitive information that may traverse public (un-trusted) networks. This thesis provides a brief description of the background and functional components of a PKI, and then "builds" a PKI to be used for research at the Naval Postgraduate School (NPS). Deficiencies of this PKI with respect to DoD PKI policy are delineated. The thesis addresses details of software selection, installation, configuration and operation; using Netscape's Certificate Management System as its Certificate Authority application of choice. The functionality of this PKI was validated by testing all major certificate lifecycle events (creation, archival, revocation, validation, etc.) All but two of these tests were successful-key escrow and revocation checking-and thus these two remain to be addressed by further work to make the NPS PKI fully functional.
First Lieutenant, United States Air Force
Lieutenant Commander, United States Navy
APA, Harvard, Vancouver, ISO, and other styles
47

Diekmann, Cornelius Hermann [Verfasser], Georg [Akademischer Betreuer] [Gutachter] Carle, and Steven M. [Gutachter] Bellovin. "Provably Secure Networks: Methodology and Toolset for Configuration Management / Cornelius Hermann Diekmann ; Gutachter: Georg Carle, Steven M. Bellovin ; Betreuer: Georg Carle." München : Universitätsbibliothek der TU München, 2017. http://d-nb.info/1139119230/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Egan, Melissa K. "An implementation of remote application support in a multilevel environment." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Mar%5FEgan.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2006.
Thesis Advisor(s): Cynthia E. Irvine, Thuy D. Nguyen. "March 2006." Includes bibliographical references (p. 123-124). Also available online.
APA, Harvard, Vancouver, ISO, and other styles
49

Nam, Kyungdoo T. "A Heuristic Procedure for Specifying Parameters in Neural Network Models for Shewhart X-bar Control Chart Applications." Thesis, University of North Texas, 1993. https://digital.library.unt.edu/ark:/67531/metadc278815/.

Full text
Abstract:
This study develops a heuristic procedure for specifying parameters for a neural network configuration (learning rate, momentum, and the number of neurons in a single hidden layer) in Shewhart X-bar control chart applications. Also, this study examines the replicability of the neural network solution when the neural network is retrained several times with different initial weights.
APA, Harvard, Vancouver, ISO, and other styles
50

Tröger, Ralph. "Supply Chain Event Management – Bedarf, Systemarchitektur und Nutzen aus Perspektive fokaler Unternehmen der Modeindustrie." Doctoral thesis, Universitätsbibliothek Leipzig, 2014. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-155014.

Full text
Abstract:
Supply Chain Event Management (SCEM) bezeichnet eine Teildisziplin des Supply Chain Management und ist für Unternehmen ein Ansatzpunkt, durch frühzeitige Reaktion auf kritische Ausnahmeereignisse in der Wertschöpfungskette Logistikleistung und -kosten zu optimieren. Durch Rahmenbedingungen wie bspw. globale Logistikstrukturen, eine hohe Artikelvielfalt und volatile Geschäftsbeziehungen zählt die Modeindustrie zu den Branchen, die für kritische Störereignisse besonders anfällig ist. In diesem Sinne untersucht die vorliegende Dissertation nach einer Beleuchtung der wesentlichen Grundlagen zunächst, inwiefern es in der Modeindustrie tatsächlich einen Bedarf an SCEM-Systemen gibt. Anknüpfend daran zeigt sie nach einer Darstellung bisheriger SCEM-Architekturkonzepte Gestaltungsmöglichkeiten für eine Systemarchitektur auf, die auf den Designprinzipien der Serviceorientierung beruht. In diesem Rahmen erfolgt u. a. auch die Identifikation SCEM-relevanter Business Services. Die Vorzüge einer serviceorientierten Gestaltung werden detailliert anhand der EPCIS (EPC Information Services)-Spezifikation illustriert. Abgerundet wird die Arbeit durch eine Betrachtung der Nutzenpotenziale von SCEM-Systemen. Nach einer Darstellung von Ansätzen, welche zur Nutzenbestimmung infrage kommen, wird der Nutzen anhand eines Praxisbeispiels aufgezeigt und fließt zusammen mit den Ergebnissen einer Literaturrecherche in eine Konsolidierung von SCEM-Nutzeffekten. Hierbei wird auch beleuchtet, welche zusätzlichen Vorteile sich für Unternehmen durch eine serviceorientierte Architekturgestaltung bieten. In der Schlussbetrachtung werden die wesentlichen Erkenntnisse der Arbeit zusammengefasst und in einem Ausblick sowohl beleuchtet, welche Relevanz die Ergebnisse der Arbeit für die Bewältigung künftiger Herausforderungen innehaben als auch welche Anknüpfungspunkte sich für anschließende Forschungsarbeiten ergeben.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography