To see the other types of publications on this topic, follow the link: VLANs.

Dissertations / Theses on the topic 'VLANs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 47 dissertations / theses for your research on the topic 'VLANs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Gurramkonda, Reddy Kamal Teja. "Performance Analysis on Dynamic VLAN an OpenFlow." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10794.

Full text
Abstract:
In the current innovative network, to cope with the increased require- ments of customers, there is a rapid increase in the development of dierent protocols and applications. With such increase in networking technology, the security constraints are becoming more and more severe, reducing the accessibility to the actual network for implementing new protocols. This scenario forced for an urgent need of a technology, which can help the re- searchers to implement their developed protocols in the network without inuencing the production trac. This need resulted in a concept called network isolation. This is achieved by VLAN or SDN technologies. In this study, we investigate the performance of VLAN and an API of SDN in the context of establishing dynamic link, in switching setup. For such a link creation, dynamic VLAN (dVLAN) is used in the former case and OpenFLow protocol is used in the later scenario. The main focus in this study is to compare the dynamic behavior of both the protocols in layer-2 context by measuring network level performance metrics of each protocol. Some of the features like, vendor independency and software independency is taken into account while measuring the performance metrics. In order to evaluate the performance, an experimental testbed is implemented. The network level performance metric called protocol setup time is measured. It is the time taken by each protocol to setup an active link between two end-hosts. A two-tire network architecture is implemented with the mentioned features. From the analytical and statistical results obtained, OpenFlow re- sulted in performing relatively better when compared to dynamic VLANs. By carefully examining the protocol setup time of OpenFlow against dVLAN, OpenFlow took less time when compared to dVLAN resulting in faster exe- cution in enabling connectivity. On the other hand, the analytical study on the two protocols reects the simplicity exhibited by dVLAN over Open- Flow.
APA, Harvard, Vancouver, ISO, and other styles
2

Sokolov, Vlas [Verfasser], and Paola [Akademischer Betreuer] Caselli. "Early stages of massive star formation / Vlas Sokolov ; Betreuer: Paola Caselli." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2018. http://d-nb.info/1170582753/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

八槇, 博史, 信夫 河口, 由紀子 山口, 八郎 安藤, and 正也 石原. "NICE におけるVLAN 管理システムの開発." 名古屋大学情報連携基盤センター, 2008. http://hdl.handle.net/2237/10230.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Grigorescu, Vlass Melissa [Verfasser], and Hans-Joachim [Akademischer Betreuer] Anders. "Inflammasome-independent NLRP3 signaling in chronic kidney disease / Melissa Grigorescu Vlass ; Betreuer: Hans-Joachim Anders." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2018. http://d-nb.info/1167160460/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Semionovas, Valentinas. "Atviro kodo programos korporatyvinio tinklo apsaugai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080924_175423-27114.

Full text
Abstract:
Šiame darbe supažindinama su kompiuterinių tinklų apsaugos problemomis, pagrindiniais tinklo veikimo principais. Išaiškinti pagrindinai kompiuterinių tinklų struktūros modeliai. Išanalizuotos ir išaiškintos pagrindinės kompiuterių tinklo plėtros, sujungimo, maršrutizavimo, vaizdavimo, valdymo ir monitoringo problemos. Išnagrinėjus esamas kompiuterinių tinklų problemas, buvo sukurtas naujas tinklo modelis, užtikrinantis lengvą ir greitą tinklo išteklių ir vartotojų segmentaciją, pastovų ir nepertraukiamą visų tinklo mazgų darbą, o svarbiausiai užtikrinantis didelį visų kompiuterių tinklo vartotojų ir išteklių apsaugą. Taip pat yra numatyta lengva galimybė dėl naujų ar kitų tinklo segmentų prijungimo ir to paties tinklo augimo ir plėtros. Atlikti eksperimentai su naujų kompiuterių tinklų modeliais, aiškinantis teorinius ir praktinius VLAN tinklų kiekius, kuriuos pasiekus ar viršijus, vertėtų atlikti tinklo segmentaciją ir aiškinantis jų įtaką maršrutizatoriaus apkrovai ir veikimui.
In this work you’ll learn about computer network’s problems and basic network operation principles, also the basic computer network’s structure models explained. Analyzed and explained basic problems about computer network development, connection, routers, monitoring and operation. After researching the existing computer network problems there was new network model designed. This model ensures easy and fast users and resources segmentation, constant and continuous work of all the network nodes and above all ensures the reliable protection for computer users and sources. Also there is the opportunity for the new or existing segments to hook up to the main network easily and for its growth and development. There were carried out the experiments with the new models of computer network, which helped to explain the theoretical and practical VLAN numbers. In case of reaching or exciding those VLAN numbers it is necessary to carry out network’s segmentation and clarify its influence on router’s overload and operation.
APA, Harvard, Vancouver, ISO, and other styles
6

Yu, Chen. "SCHEDULING AND RESOURCE MANAGEMENT FOR COMPLEX SYSTEMS: FROM LARGE-SCALE DISTRIBUTED SYSTEMS TO VERY LARGE SENSOR NETWORKS." Doctoral diss., Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Abrar, Mirza Kashif, and Imran Pervaiz. "Reliability and Load Handling Problem in Internet Service Provider’s Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4228.

Full text
Abstract:

This thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.

With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.

The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.

With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.

APA, Harvard, Vancouver, ISO, and other styles
8

Downing, Bob, Jim Harris, Greg Coggins, and Russell W. James. "WINGS NETWORK ARCHITECTURE FOR THE MISSION SEGMENT DATA DISTRIBUTION." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605810.

Full text
Abstract:
International Telemetering Conference Proceedings / October 20-23, 2003 / Riviera Hotel and Convention Center, Las Vegas, Nevada
The Western Aeronautical Test Range (WATR) Integrated Next Generation System (WINGS) Mission Segment provides data acquisition, processing, display and storage in support of each project’s mission at NASA Dryden Flight Research Center (DFRC). The network architecture for WINGS Mission Segment is responsible for distributing a variety of information from the Telemetry and Radar Acquisition and Processing System (TRAPS), which is responsible for data acquisition and processing, to the Mission Control Centers (MCCs) for display of data to the user. WINGS consists of three TRAPS and four MCCs, where any TRAPS can drive any one or multiple MCCs. This paper will address the requirements for the TRAPS/MCC network and the design solution.
APA, Harvard, Vancouver, ISO, and other styles
9

Molina, Ruiz Julio Edgar. "Propuesta de segmentación con redes virtuales y priorización del ancho de banda con QoS para la mejora del rendimiento y seguridad de la red LAN en la Empresa Editora El Comercio Planta Norte." Thesis, Universidad Católica Santo Toribio de Mogrovejo, 2012. http://tesis.usat.edu.pe/jspui/handle/123456789/77.

Full text
Abstract:
El presente trabajo plantea una propuesta de segmentación con redes de áreas locales virtuales (VLAN) y priorización del ancho de banda con calidad de servicio (QoS) para la mejora del rendimiento y seguridad de la red de área local (LAN) en la Empresa Editora El Comercio – Planta Norte. La Empresa posee una red plana en su diseño lo cual dificulta la administración del tráfico de la red, debido a la ausencia de estándares de calidad en gestión de tráfico LAN, políticas de seguridad no alineadas a las necesidades de la Empresa y desaprovechamiento de la performance de los equipos de comunicación instalados. Esto ha ocasionado la latencia de la red en horas pico, degradándose la velocidad de transferencia por el tráfico desmedido de la información y perjudicando o retardando los procesos más importantes en la empresa en intervalos de 60 a 90 minutos. Asimismo, la información periodística enviada por los corresponsales hacia la planta, ocasiona pérdida de tiempo en acciones de “subida” y “descarga” de archivos (fotos, videos, infografías, avisos publicitarios, etc.). Adicionalmente, los parámetros de seguridad de la red no garantizan la inviolabilidad de los equipos y la manipulación de la información, lo cual representa un riesgo para la integridad y desarrollo de los procesos. Por ello, se rediseñó la red para el soporte de redes LAN virtuales y de esta manera, segmentar las áreas en subredes para un mayor nivel de protección; brindar seguridad (listas de control de acceso ACL, tecnologías emergentes en seguridad Windows Server 20008, nivel de autentificación – Radius); mejorar el consumo de ancho de banda (calidad de servicio QoS, protocolo de agregación de enlaces de control LACP, troncales, etc.); implementar nuevos protocolos en tecnología Cisco; instalar redes inalámbricas y nuevos servicios de transferencia de archivos (protocolo de transferencia de archivos FTP).
APA, Harvard, Vancouver, ISO, and other styles
10

Jašíček, Petr. "Softwarový kontrolér Wi-Fi přístupových bodů se systémem OpenWrt." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400887.

Full text
Abstract:
The aim of this thesis was to create a web application used for centralized management and configuration of wireless networks on access points running on OpenWrt distribution. The reader is acquainted with common principles of wireless networks including description of existing solutions for their centralized management. After that the thesis introduces the reader to OpenWrt distribution and to a method of its configuration using UCI model. The reader is then introduced to the main technologies used in this thesis. Author further describes architecture, user interface and implementation of the web application. The created web application is platform agnostic and provides easy way to manage and configure access points with OpenWrt distribution.
APA, Harvard, Vancouver, ISO, and other styles
11

Hermansson, Christopher, and Sebastian Johansson. "Segmentering av lokala nätverk - För mikro- och småorganisationer." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5903.

Full text
Abstract:

Syftet med den här rapporten är att beskriva ett antal olika tillvägagångssätt man kan använda sig av då man har behov av att dela in ett lokalt nätverk i olika segment och med det även kunna reglera trafikflödet mellan segmenten. De lösningar som presenteras i arbetet är inriktade mot mikro- och småföretag.Anledningen till att vi har valt att arbeta med det här området är att vi anser att det är viktigt för organisationer att har en strukturerad och segmenterad design på sitt interna datornätverk.Vi har arbetat genom att i förväg samla in information om olika tekniker som kan tänkas lösa vårt problem, och därefter testat olika scenarion med dessa tekniker. Data har samlats in efter varje genomfört scenario och sammanställts i statistisk form för att kunna avgöra vilken metod som var att föredra.Vi har testat lösningar där man segmenterar nätverket i en lager 2-switch medan man möjliggör och förhindrar trafikflöde mellan segmenten i en router. Även lösningar där man använder en lager 3-switch har testats. På så sätt kan routningen ske direkt i switchen och det blir betydligt mindre belastning i routern. Resultatet visar att då man vill segmentera ett nätverk så är det rekommenderat att man använder sig av VLAN och ACL:er och eventuellt i kombination med en brandvägg.Slutresultatet av rapporten är att en lösning med ”router on a stick” är den billigaste lösningen och troligen den som de flesta mindre företag skulle klara sig med. Vilken lösning man väljer beror dock helt på hur mycket pengar man vill lägga på sitt nätverk samt vad kraven är.


The purpose of this report is to describe a number of approaches that can be used when you are in need of dividing a local area network in a number of segments, and with that also be able to control how data traffic is allowed to traverse between the different segments. The solutions that are presented are focused towards micro and small companies.The reason that we have chosen to work with this matter is that we believe it is important for organizations to have a structured and segmented design of its internal computer network.We have been working by in advance collecting information about various techniques that might solve our problem, and then testing different scenarios using these techniques. Data have been collected after each tested scenario and compiled in statistical form in order to determine which method that was preferable.We have been testing solutions were you segment the network in a layer 2 switch while you allow or deny communication between the segments in a router, and also solutions were you use a layer 3 switch. In that way you can let the routing be performed in the switch, which leads to significantly lower load on the router. The result was that if you are about to segment a local area network it is recommended that you use VLAN and ACL:s, and possibly in combination with a firewall.The final result of this report is that a solution using the “router on a stick”-technique is the cheapest one, and probably the one that most small companies would get along with. However, the solution that you choose depends completely on how much money you want to spend on your network, and also what the needs are.

APA, Harvard, Vancouver, ISO, and other styles
12

Brázda, Libor. "Využití virtuálních lokálních sítí pro efektivní a pružný návrh datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220650.

Full text
Abstract:
This thesis is aimed to the problems of virtual local networks. In the first chapters are explained both basic and advanced methods of designing and management of virtual LAN networks. The following chapters are dedicated to the methods of effective management VLAN networks and to the protocol Spanning Tree, preventing formation of loops in redundant networks, and their exploitation in VLANs. The practical part describes the application of the implementation of the technology of virtual local networks in experimental network, containing various types of devices. Based on this theory, a laboratory assignment has been designed for the training of the students in solving such problems. The scope of the laboratory assignment is divided into simpler partial tasks, which even a less advanced student should be able to configure and test.
APA, Harvard, Vancouver, ISO, and other styles
13

Proscia, Michele. "Sistema di monitoraggio rete layer 2 attraverso ARPwatch." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19117/.

Full text
Abstract:
L’obbiettivo di questo progetto è quello di riunire i due servizi di monitoraggio (ARPwatch e IMC), già in uso all'interno della rete LAN universitaria, in un unico sistema, in modo che sia più facile tenere traccia dei malfunzionamenti e fornire al personale tecnico di ateneo un valido strumento per far fronte a problemi conosciuti e imprevisti della rete.
APA, Harvard, Vancouver, ISO, and other styles
14

Ögren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.

Full text
Abstract:
Many reports have been written about the techniques behind Virtual Private Networks (VPN) and Multi Protocol Label Switching (MPLS). They usually deal with the low level design of the software implementing a specific technique. The initial products are usually not mature enough to run in a large network or have to be adjusted in some way to fit. This report investigates the different ways of implementing strict layer 2 Virtual Private Networks in an existing nation-wide Gigabit Ethernet. The infrastructure in use, as well as the hardware, has to be used without major changes. Since 1998/1999, when MPLS first started in the laboratories, development has continued. Today it is possible to introduce MPLS or tunneled national virtual local area network into an existing network. This requires high speed, fault tolerant, and stable hardware and software. Going beyond the separation of traffic at layer 3 using Virtual Private Networks, i.e., IPSec, we can tunnel layer 2 traffic through a network. Although the first layer 3 VPN products are already in use, layer 2 VPNs still need to be evaluated and brought into regular use. There are currently two ways of tunneling VLANs in a core network: tunneled VLANs (or as Extreme Networks calls them, VMANs) and MPLS. This project showed that it is possible to start with a VLAN-only solution, and then upgrade to MPLS to solve scalability issues. The VMAN solution can not be used at Arrowhead, since there are too many disadvantages in the way Extreme Networks has implemented it. However, a mix of tunneling VMAN in a VLAN core is possible, and enables customer tagging of VLANs in a Layer 2 VPN. Furthermore, the testing of EAPS and per-VLAN Spanning Tree Protocol turned out well, and showed that EAPS should not be used when there is more than one loop.
APA, Harvard, Vancouver, ISO, and other styles
15

Ollé, Karol. "Návrh a simulace podnikové sítě, virtuální laboratoř Cisco." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217547.

Full text
Abstract:
Tématem této diplomové práce (dále jen DP) je návrh rozsáhlých podnikových sítí podle doporučení stanovených společností Cisco. Dále je realizována simulace navržené topologie prostřednictvím programů s otevřeným zdrojovým kódem a dohled nad sítí prostřednictvím programu Nagios. Úvodní část obsahuje stručné seznámení se základním rozdělením sítě do jednotlivých funkčních bloků. Druhá část se zabývá popisem jednotlivých funkčních bloků a jejich rolí v rámci celé síťové topologie. Bloky jsou dále rozděleny na jednotlivá zařízení a jsou popsány služby, které tato zařízení musí poskytovat. Třetí část DP se snaží zmapovat základní požadavky na služby, které jsou kladeny na dnešní síťové infrastruktury. Hlavní důraz je kladen na dostupnost všech nabízených služeb sítě. Jsou vyjmenovány jednotlivé protokoly druhé až třetí vrstvy OSI modelu, které zabezpečují stálou dostupnost sítě v případě selhání aktivních prvků. Čtvrtá část DP se věnuje popisu návrhu síťové topologie WAN. Pátá část obsahuje popis bezpečnostních rizik, která ohrožují dostupnost sítě, tak i popis útoků, které mají za cíl krádež identity uživatele. V šesté části DP jsou popsány programové nástroje pro zprávu sítí (Nagios, Cisco Security Device Manager) a programy, které simulují Cisco přepínače, směrovače (Dynamips & Dynagen, GNS3) a Cisco PIX firewall (PEMU). Sedmá kapitola se zabývá konkrétním návrhem rozsáhlé sítě s použitím principů, které byly zmíněny v předcházejících kapitolách. Navržená infrastruktura je dále realizována pomocí simulačních programů a tato virtuální síť dovoluje demonstrovat nastavení a chování všech popsaných protokolů a zařízení. V závěrečném shrnutí je nejdůležitější poznatek, že návrh a konfigurace rozsáhlé sítě a její realizace ve virtuálním prostředí je funkční a použitelná pro pokusné účely i pro studijní účely.
APA, Harvard, Vancouver, ISO, and other styles
16

Hlavatý, Jindřich. "Nové trendy v návrhu datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221063.

Full text
Abstract:
are used. In the theoretical part I analyse some basic network protocols and their gradual development, VLANs and Spanning Tree Protocol, MPLS protocol and other. There are described parameters for the design of new networks and the models networks and their various are used, the network with a new architecture and a software-defined network (SDN),too. The practical part deals with designed laboratory exercises for teaching students. The laboratory experiments are always divided into several tasks. They are formed even students ignorant or less familiar with the issue could configure and test it.
APA, Harvard, Vancouver, ISO, and other styles
17

Schade, Markus. "Netzentwicklung im CSN." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401358.

Full text
Abstract:
Das Chemnitzer StudentenNetz (CSN) verwaltet ein mittelgroßes Netzwerk in den Wohnheimen des Studentenwerkes Chemnitz-Zwickau. Mitarbeitern und Interessenten erhalten einen Überblick und Einblick in die vorhandene Netzstruktur und die Konfiguration der verwendeten Technik. Es wird auch auf mögliche Szenarien für zukünftige Entwicklungen eingegangen.
APA, Harvard, Vancouver, ISO, and other styles
18

Breiler, Andre. "Differenzierte Bereitstellung von Internetdiensten in öffentlichen Bereichen der Universität." Master's thesis, Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100099.

Full text
Abstract:
Die vorliegende Arbeit entwickelt und implementiert ein System für die Bereitstellung von Internet-Diensten an öffentlichen Orten. Besonderer Wert wurde auf eine einfache Handhabung für den Nutzer, eine breite Unterstützung von Klienten und ein breites Spektrum möglicher Privilegien (von der vollen Internetkonnektivität bis zu einer Art Infoterminalstatus) gelegt.
APA, Harvard, Vancouver, ISO, and other styles
19

Kratzert, Sebastian, and Manuel Möller. "Dokumentation Netzwerk Chemnitzer Linux-Tag 2004." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400738.

Full text
Abstract:
Während sich der Chemnitzer Linux-Tag über die vergangenen fünf Jahre mit jedem Mal in der Zahl der Aussteller, Helfer und Gäste steigerte, wuchs auch in jedem Jahr das Tagungsnetzwerk. Den Informatikern wird häufig nachgesagt, daß sie wenig dokumentieren würden. Dieses Vorurteil traf auch für das Netzwerk der vergangenen Chemnitzer Linux-Tage zu. Unter anderem, um diesem Mißstand abzuhelfen, haben wir uns bemüht, möglichst detailliert Informationen über Konzept, eingesetzte Technologieen und konkrete Konfiguration des Tagungsnetzwerks des Chemnitzer Linux-Tags 2004 zusammenzutragen.
APA, Harvard, Vancouver, ISO, and other styles
20

Kraus, Zdeněk. "Modelování a analýza spolehlivosti počítačové sítě VUT." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237089.

Full text
Abstract:
This thesis informs about technologies and architecture of computer network at BUT.  It describes chosen technologies and some of theirs variants.  Further, it contains simulation model design of a network switch device.  That is followed by the model implementation with detailed description of model parts. Then, the model is tested on a set of simulation scenarios and it is evaluated in comparison with theoretical basis and real devices.  In conclusion, thesis suggests future model development and improvements.
APA, Harvard, Vancouver, ISO, and other styles
21

Dušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.

Full text
Abstract:
This diploma thesis deals with the evaluation of a security solution that was recently deployed by a British company renting office space. This validation system is based on a database of MAC addresses, a database of clients and active filtering of connected devices. The first part explains the concepts of computer network, VLAN and basic concepts needed to understand the function of dynamic assignment of VLAN and IP addresses. The second part is devoted to measurements based on hypotheses, according to which measures are proposed in the last part to solve these security problems.
APA, Harvard, Vancouver, ISO, and other styles
22

Gonçalves, José Pedro Costa. "Estratégias de implementação de redes empresariais." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/12830.

Full text
Abstract:
Mestrado em Engenharia Eletrónica e Telecomunicações
Este trabalho pretende criar um manual que estabeleça os princí-pios básicos a adotar na conceção de desenhos de redes empresa-riais, sobretudo no que se refere ao balanceamento da sua dispo-nibilidade, segurança e flexibilidade, tendo em atenção os requisi-tos próprios de cada empresa. Com esse intuito, serão apresenta-das estratégias e procedimentos para a implementação de redes multicamada. As estratégias definidas pretendem atingir os seguin-tes objetivos: a implementação de grupos lógicos dentro da rede, o encaminhamento entre os mesmos e a garantia de alta disponibili-dade e redundância da rede. Esta dissertação desenvolve-se em vários momentos, sendo de sublinhar: a apresentação dos concei-tos indispensáveis à compreensão da temática; a análise de topo-logias, com recurso a um software de simulação de redes, a fim de exemplificar a configuração dos vários modelos que podem ser usados na conceção da rede empresarial; a análise de cada um dos cenários estudados.
The goal of this work is to create a manual, establishing the basic principles to adopt in the conception of enterprise network designs, mainly through the balancing of its availability, security and flexibility; taking into consideration the requirements of each company. For that purpose, strategies and procedures for implementation of multilayer networks will be presented. The defined strategies, aim to achieve the following purposes: implementing logical groups within the network, the forwarding between them and ensuring high availability and network redundancy. This essay develops at several moments in which we can highlight: introduction of necessary concepts for the comprehension of the subject¸ simulation of topologies, using a software network simulator, in order to illustrate the configuration of the various models that can be applied in the design of the enterprise network; the analysis of each studied scenarios.
APA, Harvard, Vancouver, ISO, and other styles
23

Eisazadeh, Ali Akbar, and Nora Espahbodi. "Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3859.

Full text
Abstract:

One of the most parts of VOIP management is fault management and, in having a good fault management, finding good mechanisms to detect faults in the network have to be considered.

The main focus of this project is to implement different types of fast fault recovery protocols in networks, especially networks that carry IP telephony. Having a complete understanding of some common link failure detection and fault recovery protocols, such as spanning tree protocol (STP), rapid spanning tree protocol (RSTP) and per-VLAN spanning tree protocol (PVSTP), and also having a complete understanding of three other common techniques for fault detection and fault recovery, such as hot standby routing protocol (HSRP), virtual router redundancy protocol (VRRP) and gateway load balancing protocol (GLBP) will be regarded in the project. We are going to test some fault recovery protocols which can be used in IP telephony networks and choose the best. We intend to focus on this issue in LAN environment in theoretical descriptions and practical implementations.

The final outcome of the thesis is implementation in the Halmstad University’s lab environment to obtain the final result. For doing our thesis, we are going to use some technical tools as hardware tools (Cisco L3 and L2 switches, Routers, IP Phones) and tools which are used for network performance monitoring, like as CommVeiw.

APA, Harvard, Vancouver, ISO, and other styles
24

Eriksson, Jhonny, and Joel Karlsson. "Granskning och optimering av data- och IP-telefoninätverk." Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9739.

Full text
Abstract:

The company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today’s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities. Therefore, it is of grave importance to optimize a network design, use of hardware and to minimize the administrative overhead. In particular, when the municipality is short of resources and time means money. By letting an impartial investigation of the network act as a starting point it was established that several improvement could be applied. Among these a reconstructed and improved network topology that includes subjects as routing, switching, safety and security, quality of service and technical administrative overhead and the implementation of a real time monitoring of network bandwidth consumption.


Företaget Västra Mälardalens Kommunalförbund, VMKF, har önskemål om att granska och optimera deras befintliga data- och IP-telefoninätverk som i dagsläget spänner över de tre kommunerna Köping, Arboga och Kungsör. Som ett kommunalägt företag önskar de konsultation rörande intern såväl som extern granskning och optimering av huvuddelen av nätverkets funktionalitet samt säkerhet. I och med dagens ökade Internetanvändning och funktionalitetsbehov ställs allt högre krav på tillgänglighet, säkerhet och användarvänlighet. Nätverksteknik bygger mycket på balansen mellan dessa tre punkter. Därför gäller det att optimera nätverkets design, hårdvaruanvändning och att minimera administrativa laster. Detta i synnerhet då kommunens resurser är knappa och då tid i dagens samhälle innebär pengar. Genom att låta en granskning över nätverket som det ser ut i dag ligga till grund konstaterades att flertalet förbättringsmöjligheter kunde genomföras. Bland dessa återfinns en omstrukturerad nätverksdesign som innefattar routing, switching, säkerhet, QoS och teknisk administration samt implementeringen av en realtidsövervakning av bandbreddsanvändning.

APA, Harvard, Vancouver, ISO, and other styles
25

Vaclík, Michal. "Správa podnikových datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317117.

Full text
Abstract:
Master’s thesis discusses the design and implementation of network infrastructure for computer laboratory in Department of Communications. Thesis focuses on VLAN definitions and deployment of server virtualization, including network monitoring station.
APA, Harvard, Vancouver, ISO, and other styles
26

Janošík, Martin. "Návrh virtuální lokální počítačové sítě pro edukativní účely." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217529.

Full text
Abstract:
The master’s thesis focuses on the virtual local computer network for laboratory usage. It aims to propose and realize proper network connection in order to monitor expected data flow. Thanks to the network analysers (software ClearSight and hardware NetTool Series II) it plans to pursue in detail the used transmission protocols of TCP/IP layers. The most decisive feature happens to be the right choice of appropriate network components and their precise configuration. Consequently, the thesis formulates a proposal of a laboratory task for the needs of students, which is also closely related to the actual problems. The assignment of the task will serve the teachers as a test pattern for measurement. The results elaborated in the form of the model protocol should enable later comparison of the recorded data. Another part of the diploma thesis is the working-out of well arranged manuals for the network analysers involved.
APA, Harvard, Vancouver, ISO, and other styles
27

Lichtner, Ondrej. "Networking Subsystem Configuration Interface." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235421.

Full text
Abstract:
Cílem diplomové práce je návrh síťové konfigurační knihovny s důrazem kladeným na přenositelnost mezi operačními systémy na bázi Linuxu a BSD a rozšiřitelnosti podpory knihovny. V druhé kapitole práce zkoumá dostupné konfigurační rozhraní obou operačních systémů. Detailně pak rozebírá vlastnosti rozhraní Netlink socketů, které je primárním konfiguračním rozhraním pro síťové prvky na Linuxu, a systémové volání ioctl, které má na Linuxu menší schopnosti, ale zato je primárně používané na BSD a jiných UNIX systémech. Jsou též zkoumané rozhraní pro konfiguraci rozdílných firewallů. V třetí kapitole je práce zameřená na konkrétní typy síťových zařízení, specifika jejich konfigurace a jejich návaznost na rozhraní jádra popsané v druhé kapitole. V čtvrté kapitole jsou formulovány požadavky na konfigurační knihovnu: jednoduchá rozšiřitelnost, přenositelnost na různé operační systémy, podpora sledování změn a událostí a rozšiřitelnost o různé typy uživatelských rozhraní. Na základě výzkumu z předcházejících dvou kapitol je přednesen návrh knihovny. Návrh definuje konfigurační rozhraní jako hierarchii abstraktních tříd, oddělených od implementace. To umožnuje mít současně několik implementací stejného konfiguračního rozhraní i v rámci jednoho operačního systému. Jako vstupní rozhraní knihovny je definovaná třída LibNCFG, která má na starosti tyto konfigurační objekty vytvořit namísto uživatele. Tímto je dosažená jednoduchá rozšiřitelnost knihovny o nové rozhraní operačních systémů i o podporu konfigurace nových síťových prvků. Podpora pro nové uživatelské rozhraní se dá implementovat jako nová služba, která zabaluje rozhraní knihovny a poskytuje jiná rozhraní. Pro podporu sledování změn poskytuje třída LibNCFG metody pro registraci zpětných volání pro definované události. Ve čtvrté kapitole práce detailně popisuje rozhraní třídy LibNCFG, modulu Common a tříd NetDevice, EthDevice a BondDevice, které definují konfigurační rozhraní příslušných typů síťových zařízení. Pro tyto třídy jsou implementované konkrétní třídy NetlinkNetDevice, NetlinkEthDevice a sysfsBondDevice a popsané jejich implementační detaily. V páté kapitole je popsaná ukázková aplikace, která byla implementovaná pro účely předvedení jednoduchosti použití konfigurační knihovny. Nakonec jsou v závěru shrnuté výsledky práce a je vedena diskuze o možných vylepšeních a o pokračování projektu.
APA, Harvard, Vancouver, ISO, and other styles
28

Lomnický, Marek. "Analýza a demonstrace vybraných L2 útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236714.

Full text
Abstract:
This MSc Thesis focuses on principles, practical performability and security against four attacks used in contemporary local-area networks: CAM Table Overflow capable of capturing traffic in switched networks, ARP Man-in-the-Middle, whose target is to redirect or modify traffic and against two variants of VLAN Hopping attack allowing a hacker to send and capture data from VLANs he has no access to.
APA, Harvard, Vancouver, ISO, and other styles
29

Kratochvíl, Petr. "Optimalizace ethernetové sítě ve výrobním podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413082.

Full text
Abstract:
This diploma thesis describes the work performed in the optimization of the corporate network in the company Alps Electric Czech to expand the amount of information obtained about the state of the network and thus improve the response of the IT department to potencial errors. During the optimization, a monitoring system was also deployed and its connection to the helpdesk and a tailor-made website running on the Flask microframework. With the gradual deployment, adjustments were made based on feedback from the IT department staff. Overall, the network has become more clarified, increasing the efficiency of maintenance and service.
APA, Harvard, Vancouver, ISO, and other styles
30

Dudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.

Full text
Abstract:
This diploma thesis deals with the design and implementation of a tool for network attack detection from a captured network communication. It utilises the tshark packet analyser, the meaning of which is to convert the input file with the captured communications to the PDML format. The objective of this conversion being, increasing the flexibility of input data processing. When designing the tool, emphasis has been placed on the ability to expand it to detect new network attacks and on integrating these additions with ease. For this reason, the thesis also includes the design of a complex declarative descriptions for network attacks in the YAML serialization format. This allows us to specify the key properties of the network attacks and the conditions for their detection. The resulting tool acts as an interpreter of proposed declarative descriptions allowing it to be expanded with new types of attacks.
APA, Harvard, Vancouver, ISO, and other styles
31

Prudík, Jiří. "Model metropolitní optické sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217666.

Full text
Abstract:
The purpose of this master’s thesis is foremost to provide a simple guide how to build elements of optical metropolitan area network. The basic model consists to sequence of construction, network topology, passive and active parts. The collection contains examples of alternative technology such as Wireless LAN with different frequency. The optical network construction based on optical cable, fibres, splices, trays, adapters, connectors and active parts for example a lot of media convertor models. After that there are demonstrating type of wavelength division multiplexer used in metropolitan area network – passive planar PCL splitter. One of the passive planar splitter are used to increase optical fibre channel. At the end of the collection a simplified examples of used measurements – optical time domain reflectometry and optical fibre transmission. Contains standard protocols or reflectogram. The conclusion of this thesis summarizes costs of FTTb (Fibre To The Building) model of optical metropolitan area network in Czech republic and future contribution for society.
APA, Harvard, Vancouver, ISO, and other styles
32

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciare a due segmenti di LAN aventi due maschere di sotto-rete differenti. L'attacco viene analizzato mediante vari software. Si può infatti definire una terza parte del lavoro, la parte dove vengono analizzati i file catturati dalle due interfacce con i software che prima si occupano di analizzare i dati di contenuto completo, come Wireshark, poi dei software che si occupano di analizzare i dati di sessione che sono stati trattati con Argus, e infine i dati di tipo statistico che sono stati trattati con Ntop. Il penultimo capitolo, quello prima delle conclusioni, invece tratta l'installazione di Nagios, e la sua configurazione per il monitoraggio attraverso plugin dello spazio di disco rimanente su una macchina agent remota, e sui servizi MySql e DNS. Ovviamente Nagios può essere configurato per monitorare ogni tipo di servizio offerto sulla rete.
APA, Harvard, Vancouver, ISO, and other styles
33

Silva, Paulo Alexandre de Freitas Branco Guedes da. "Relatório de atividade profissional." Master's thesis, 2014. http://hdl.handle.net/10362/17631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Yen, Peng Kao, and 高燕鵬. "A Study On VLAN Hopping Attack and Defense." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/85327420974340066260.

Full text
Abstract:
碩士
國防大學中正理工學院
資訊科學研究所
95
This dissertation examines the threats of “VLAN Hopping Attack” and their countermeasures. Different approaches of the hopping attacks on different network environments are studied, implemented, and discussed thoroughly. The VLAN (Virtual Local Area Network) is designed, based on the IEEE 802.1Q standard, to improve the network performance by adequately configuring the software of switches for segmenting broadcast domains, and commonly considered as a “secure network architecture”. Unfortunately, the original design of IEEE 802.1Q does not provide any authentication mechanism on the tag of IEEE 802.1Q frames, which may leave the network under the threats of malicious attacks. We implement various “VLAN Hopping Attack” scenarios on different VLAN structures in order to understand and analyze the attacks in detail. Thereafter a network framework has been proposed as the countermeasures, and implemented in our test-bed. The principle of the proposed solution comes from the idea of “Defense in Depth", and results of the experiment show that our approaches are effective in defending VLAN hopping attack.
APA, Harvard, Vancouver, ISO, and other styles
35

Kuo, Mei-Huan, and 郭美奐. "A Web-based network management system of VLAN." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/81347989618638219782.

Full text
Abstract:
碩士
國立交通大學
資訊管理所
87
The management of network is getting more and more important, as the internet grows rapidly up to now. As we know, the web-based network management system is a new way to manage network whose benefits include of independent platform, ease of operation and the friendly user interface. Based on the internet, we use the technology of Web and Java to build our system so that the network information can be accessed and managed easily and quickly. Besides, the virtual local area network (VLAN) is a technology to divide network into multiply logical workgroups and to configure the environments by means of network management software with no need to change the setting in the router. There are three main objectives on our researches as follows: (1) To learn the architecture of the new generation Web-based network management system, and to use the Web browser with Java to manage VLAN. (2) To study IEEE 802.1Q/D10 draft and understand the operations of VLAN in order to define the management functions and object set of VLAN. (3) To construct a management system of VLAN, and then implement a web-based network management system to promote the correctness and the efficiency of our architecture.
APA, Harvard, Vancouver, ISO, and other styles
36

Yeh, Shu-Hwa, and 葉淑華. "The evaluation of VoIP QoS on DiffServ with VLAN networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/3w7wd7.

Full text
Abstract:
碩士
靜宜大學
資訊碩士在職專班
97
Due to more and more popular of Internet, broadband technology was developed. Those make enterprises choose to use the VoIP for saving cost and the demand of VoIP has grown up gradually. However, the VoIP was implemented on Ethernet. Once traffic congestion happened on the network, the quality of communication will be influenced. Therefore, we need to do Qos on network. This thesis focuses on the application techniques and management to discover the characteristics of network protocol and the function of technology. Then, one way for regulating the traffic flow and security will be proposed. The way isolates voice traffic and data traffic on VLAN (Virtual Local Area Network) to avoid influence each other. The classifier and marker mechanism of DiffServ (Differentiated Service) are used to distinguish the service priority between voice and data traffic. Then we raise the priority on voice traffic to reduce the packet delay and lost. Using WRR (Weighted Round Robin Queue) to regulate traffic flow for the bandwidth can be fully used and taken into account transmission of other non-voice data flow at the same time. Besides, we experiment the feasibility of scheme to help network administrators to get a significant planning and configuration while setting up enterprise''s network for promoting the quality of VoIP.
APA, Harvard, Vancouver, ISO, and other styles
37

Chang, Shen-Chi, and 張盛智. "Implementation of KMLN VLAN Segment Management using VXLAN and OpenFlow." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/00858132062588191579.

Full text
Abstract:
碩士
國立中興大學
資訊科學與工程學系
102
Due to the rapid development in cloud computing, virtual machines has been widely deployed in enterprises and in data centers, the demand of resource integration of cross-platform is drastically increasing. Traditional tunneling technology allows flexibly data transmission within a subnet, but it may cause excessively unnecessary broadcast packets over data centers. In addition, the deployment of virtual machine and system configuration set up is laborious, hence it requires an automatic procedure to deal with the cloud management. This study presents the KMLN VLAN Segmentation Management System (K-VSMS) by using KMLN cloud management platform, OpenFlow Controller, and VXLAN tunneling technology. K-VSMS provides an automatic VM deployment, cluster establishment, and centralized segmentation management. We enhance the KMLN platform to include the segmentation management, so a system administrator may efficiently accomplish the establishment of virtual clusters as well as VLAN segments. Through the adoption of VXLAN, which is supported by OpenFlow, and the VM configuration, which is stored in controller database, the OpenFlow controller processes the packet forwarding accordingly for segment partitioning. As compared with two related researches, the proposed system is obviously advantageous in reducing the complexity of configuration set up and is effective in reducing the broadcast traffic.
APA, Harvard, Vancouver, ISO, and other styles
38

Chen, Shiuan-jen, and 陳宣禎. "The Design and Implementation of Java-based VLAN Management System." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/21919551783370982401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Chen, Jason, and 陳國貞. "The Design and Implementation of Integrated Multicast Service under VLAN Environment." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/49655957594207857039.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Tsai, Yi-Hsueh, and 蔡宜學. "Design of VLAN Based Fat-Tree Multipath Cloud Data Center Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/13653248089973747723.

Full text
Abstract:
碩士
國立中正大學
通訊工程研究所
103
With the growth of Cloud Service,Data Centers have become an efficient and promising infrastructure for supporting data storage.Data Centers increase the size of data dramatically.However, the traditional tree structure Data Centers network topologies will be unable to support the large data flows.Therefore, Some new network architectures are presented, such as Fat-Tree,BCube and VL2.However, new network architectures have some problems.Because of new network architectures have many redundant paths.When Data Centers run a routing protocol such as Shortest Path Routing or Minimum Spanning Tree,it will be unable to use redundant paths to achive load balancing.In order to increase the transmission capacity and high survivability.Because of Server uses ARP Protocol to learn the MAC addresses of the destination IP addresses.the growth of Server will cause a broadcast storm.Alos, the Switch will increase the size of forwarding tables dramatically.Nevertheless, the Switch can’t handle a large number of Servers and the main limitation of current data center architectures is scalability.Therefore, this paper presents the solution to using MPTCP increasing Cloud network bandwidth and using VLAN based on creating multiple Link-Disjoint paths in Cloud Data Center network.MPTCP can use different VLAN paths to effectively disperse traffic and improve the transmission efficiency. Finally, in order to reduce the ARP broadcast packet and the size of forwarding tables, the integration of SDN designs a new APR packet management method.
APA, Harvard, Vancouver, ISO, and other styles
41

HSU, CHUN-CHIN, and 許竣智. "The design and implementation of fuzz testing in VLAN, CWMP and RADIUS." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8gbxm4.

Full text
Abstract:
碩士
銘傳大學
資訊工程學系碩士班
107
The fuzz testing is to input the abnormal data into a target machine, and expects the target machine to produce unexpected events, such as crashing or restarting. In this study, we used the fuzz testing to check the vulnerabilities for three network protocols: VLAN, CWMP, and RADIUS. The implementation is divided into four parts. First, to study the network protocol concepts and their operation. Second, the packet format and transmission process of the three protocols are implemented using Python. Third, to implement the core fuzz testing. Fourth, the test packets are sent to the target machine in order to examine whether there is a security vulnerability in these network protocols supported by the target machine. Wireshark is used to observe and analyze the packet contents. The experimental results show that the VLAN tag containing the VLAN IDs 0 and 1 in the test packets are removed and then forwarded to the destination by the switch; VLAN tag containing the VLAN IDs 4095 in the test packets are discarded by the switch. In CWMP, the ACS server responds the different error messages to the test program based on the received packet. In RADIUS, the server will discard the test packets or return the rejected packets to the test program based on whether the received test packets are too long or the numerical value contained in the received test packets is unreasonable.
APA, Harvard, Vancouver, ISO, and other styles
42

Pei-WenCheng and 鄭佩汶. "Design and Implementation of a VLAN Tag-translated Mechanism on OpenFlow Networks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/q2w5h6.

Full text
Abstract:
碩士
國立成功大學
電腦與通信工程研究所
101
The rapid growth of Internet has driven the IP Network unable to fulfill the evolution of the various demanding services. Building a clean, isolated experimental platform which supports the real networking environment for developing new protocols had become the object of heading to “Future Internet”. In Taiwan, we connected the OpenFlow Networks in universities to build the virtual network upon the existed networking architecture. Although the isolated environment could be achieved by some techniques such as VPLS VPN or tunneling, some limit inside of OpenFlow Network occurred while carrying more resources or experimental applications into the virtual network. Not to mention that the mix environment of Layer 2 and Layer 3 makes the management complicated, it is urgent to develop a control mechanism that could offer flexible management and overcome the limitations. This thesis proposed a control module for managing the extensions of virtual network and implementing a VLAN tag translated mechanism. It provides the transmission for tagged-traffic across the OpenFlow Networks in Taiwan. The mechanism enables the sub-slice assignments with VLAN IDs and also the priority setup for traffics depends on the requirements from applications or services. Through development of this control module, this is the first step toward the future internet and realizes the software-defined network concept.
APA, Harvard, Vancouver, ISO, and other styles
43

Salazar, Augusto, and Augusto Salazar. "On Design and Implementation of a Flexible and Portable VLAN Translation Module." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/96930276909783471215.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
100
In IEEE 802.1Q, the Virtual Local Area Network (VLAN) is defined as the creation of a group of hosts that behave as if they were connected on the same LAN. Actual VLAN implementations on Linux do not include a flexible framework for the design and management of a VLAN-aware network. This thesis details the examination of IEEE 802.1Q and proposes a VLAN Translation Module (VTM), which is a software-based solution to provide flexible and portable VLAN implementation for the Linux operating system. The VTM offers a flexible port definition that enables users to establish the desired VLAN environment. In addition, the module offers the possibility of declaring exception rules to modify the behavior of a specific workstation in the VLAN environment. The VTM has a traditionally styled Linux user interface for easier adoption, which provides a sense of control over the configuration. VTM supplies a feature-rich and flexible VLAN implementation, rather than a module aiming for a high-bandwidth and latency-free packet transfer. VTM is implemented at the Kernel level using Netfilter technology, which allows maximum portability to any architecture supported by Linux. Two experiments are conducted to demonstrate the correctness and performance of the VTM. The VTM is compared with existing implementations for maturity, flexibility, portability amount, and other factors. The flexibility and portability of the VTM, in addition to its ability to provide a fresh look at the VLAN standard makes it a valid alternative to the Linux VLAN solution.
APA, Harvard, Vancouver, ISO, and other styles
44

Tsai, Yi Da, and 蔡易達. "A Bandwidth Effective and VLAN Support Access Point Design for 802.11 Wireless Infrastructure Networks." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/63567988056562559643.

Full text
Abstract:
碩士
大葉大學
資訊工程研究所
90
One of the most attractive features of the virtual local area network (VLAN) is the capability to group users from different physical LAN segment into a single broadcast domain. VLANs, thus, facilitate easy administration of logical groups of stations that can communicate as if they were on the same LAN. In addition, the traffic between VLANs is restricted. This limits the propagation of multicast and broadcast traffic between VLANs. These two features make the VLAN more rewarding in the wireless environment where the bandwidth is quite limited and constant moving of the mobile stations is highly anticipated. The goal of this paper is the provision of the VLAN interconnection over the shared medium metropolitan area environment where wired and wireless LAN co-exist. In such a mobile virtual LAN (MVLAN) architecture, after the registration to a specific MVLAN, a mobile station’s broadcast domain should be independent to its current location. For supporting such mobility in metropolitan area environments, we present in this report protocols required in the design of VLAN support access point (VSAP). In particular, a handoff protocol and an MVLAN member tracking protocol are provided to achieve the efficient and transparent handoff of mobile stations over MVLAN.
APA, Harvard, Vancouver, ISO, and other styles
45

Kung, Yi-Ming, and 鞏怡明. "A Study on the Operations of Spanning Tree Algorithm and Protocol in the VLAN Environment." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/09633672046122414716.

Full text
Abstract:
碩士
國立交通大學
資訊管理研究所
86
The Spanning Tree Algorithm and Protocol will configure a simplyconnected active topology from the arbitrarily connected componentsof a Bridged Local Area Network into a single spanning tree,such that there is at most one data route between any two end stations,eliminating data loops.This thesis proposes a Virtual LAN Spanning Tree Algorithm and Protocol.This algorithm is proposed according to the features of Virtual LAN.With the operation of this algorithm, all the members belong to thesame VLAN will be included in an isolated Spanning Tree. And the spann-ing tree formed for a given VLAN will use as many connection devicesthat still not participate in any spanning tree topology before aspossible.
APA, Harvard, Vancouver, ISO, and other styles
46

Wu, Hao-Ying, and 吳昊穎. "Integrating MPTCP Subflow Management and VLAN-Based Multi Paths with Openflow in a Cloud Network." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/ecbbzq.

Full text
Abstract:
碩士
國立中正大學
通訊工程研究所
103
With the growth of Cloud Service, Data Centers have become an efficient and promising infrastructure for supporting data storage. Data Centers increase the size of data dramatically. However, the traditional tree structure Data Centers network topologies will be unable to support the large data flows. Therefore, Some new network architectures are presented, such as Fat-Tree, BCube and VL2. However, new network architectures have some problems. Because of new network architectures have many redundant paths. When Data Centers run a routing protocol such as Shortest Path Routing or Minimum Spanning Tree, it will be unable to use redundant paths to achive load balancing. In order to increase the transmission capacity and high survivability. Therefore, this paper presents using VLAN based on creating multiple Link-Disjoint paths in Cloud Data Center network. Through MPTCP Subflow management and VLAN assign algorithm increase Cloud network bandwidth. Finaily using OpenFlow integrated MPTCP subflow and VLAN-Based Cloud Network, Let MPTCP subflow can use different VLAN paths to effectively disperse traffic and improve the transmission efficiency and achieve fault tolerance.
APA, Harvard, Vancouver, ISO, and other styles
47

Müller, Jean-Alexander. "ATM versus Gigabit Ethernet im TCP/IP-LAN. Design und Implementierung eines Hochgeschwindigkeitsnetzwerkes für TCP/IP." 1998. https://ul.qucosa.de/id/qucosa%3A16470.

Full text
Abstract:
Für die Implementierung von Hochgeschwindigkeits-LANs bieten sich gegenwärtig zwei Technologien an. Dies ist zunächst der verbindungsorientiert arbeitende Asynchronus Transfer Mode (ATM), welcher u.a. garantierte Bandbreiten ermöglicht und auch für WAN-Anwendungen einsetzbar ist. Ein Nachteil von ATM ist die Inkompatiblität zu den verbreitetsten LAN- Technologien, Ethernet und Token Ring. Für die Kopplung mit solchen LANs müssen spezielle Server herangezogen werden. Im Gegensatz dazu steht Gigabit Ethernet (GE) als Weiterentwicklung des Ethernet-Standards (IEEE 802.3). GE arbeitet verbindungslos und ist kompatibel zur Ethernet-Familie und anderen IEEE 802 konformen Technologien. Mit der Verfügbarkeit der IEEE-Standards 802.1p, 802.1x, 802.1Q und 802.1D sowie proprietären Mechanismen können mit Gigabit Ethernet LANs aufgebaut werden, die ATM-ähnliche Eigenschaften besitzen. Durch den Einsatz des TCP/IP Protokolls, welches traditionell in Netzen zur wissenschaftlichen Datenverarbeitung Verwendung findet, bleiben Eigenschaften, vor allem von ATM, verborgen. Dies betrifft insbesondere die dynamische Anforderung von Bandbreitengarantien (QoS).
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography