Dissertations / Theses on the topic 'VLANs'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 47 dissertations / theses for your research on the topic 'VLANs.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Gurramkonda, Reddy Kamal Teja. "Performance Analysis on Dynamic VLAN an OpenFlow." Thesis, Blekinge Tekniska Högskola, Institutionen för kommunikationssystem, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-10794.
Full textSokolov, Vlas [Verfasser], and Paola [Akademischer Betreuer] Caselli. "Early stages of massive star formation / Vlas Sokolov ; Betreuer: Paola Caselli." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2018. http://d-nb.info/1170582753/34.
Full text八槇, 博史, 信夫 河口, 由紀子 山口, 八郎 安藤, and 正也 石原. "NICE におけるVLAN 管理システムの開発." 名古屋大学情報連携基盤センター, 2008. http://hdl.handle.net/2237/10230.
Full textGrigorescu, Vlass Melissa [Verfasser], and Hans-Joachim [Akademischer Betreuer] Anders. "Inflammasome-independent NLRP3 signaling in chronic kidney disease / Melissa Grigorescu Vlass ; Betreuer: Hans-Joachim Anders." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2018. http://d-nb.info/1167160460/34.
Full textSemionovas, Valentinas. "Atviro kodo programos korporatyvinio tinklo apsaugai." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080924_175423-27114.
Full textIn this work you’ll learn about computer network’s problems and basic network operation principles, also the basic computer network’s structure models explained. Analyzed and explained basic problems about computer network development, connection, routers, monitoring and operation. After researching the existing computer network problems there was new network model designed. This model ensures easy and fast users and resources segmentation, constant and continuous work of all the network nodes and above all ensures the reliable protection for computer users and sources. Also there is the opportunity for the new or existing segments to hook up to the main network easily and for its growth and development. There were carried out the experiments with the new models of computer network, which helped to explain the theoretical and practical VLAN numbers. In case of reaching or exciding those VLAN numbers it is necessary to carry out network’s segmentation and clarify its influence on router’s overload and operation.
Yu, Chen. "SCHEDULING AND RESOURCE MANAGEMENT FOR COMPLEX SYSTEMS: FROM LARGE-SCALE DISTRIBUTED SYSTEMS TO VERY LARGE SENSOR NETWORKS." Doctoral diss., Orlando, Fla. : University of Central Florida, 2009. http://purl.fcla.edu/fcla/etd/CFE0002907.
Full textAbrar, Mirza Kashif, and Imran Pervaiz. "Reliability and Load Handling Problem in Internet Service Provider’s Network." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-4228.
Full textThis thesis puts forward a new solution to provide the reliable network to the Internet Service Provider (ISP). This study mainly focuses on the ISPs network to provide reliability and the load balancing. It offers a guide line for the best reliable solution to the ISPs, individual organizations or other types of service providers which are engaged in providing reliable communications to their subscribers. These reliable services may be real time communications which include weather forecasts, tracking systems, online Internet protocol TV (IPTV) programs and many other ISPs services which are totally depend on the reliable network.
With the appearance and expansion of Internet subscribers all over the world, ISPs services are becoming more popular. The rapid increase of connection-demand and highly traffic network is the main reason behind the need to scale reliable network. To offer better solutions, a new theoretical and practical approach should be considered that can cover the reliable network.
The suggested network structure monitors the links, spreads the network traffic with multiple devices and takes a backup (redundant) link automatically when changes occur in the network topology. In order to support the redundancy, load balancing and reduce the failover time, the hot standby routing protocol (HSRP) is implemented on the suggested network. As we have analyzed that in any network, scalability bringing to raised the network traffic broadcast issue. Broadcast storms can be prevented by setting threshold values of traffic-filters. The threshold level helps to control broadcast traffic in networks.
With regard to suggested solutions, it is necessary to observe the limitations and advantages of the recommended reliable network structure. Therefore, this research will include the advantages and limitations of the techniques used to offer ISP services such as scalability, security and IPv6.
Downing, Bob, Jim Harris, Greg Coggins, and Russell W. James. "WINGS NETWORK ARCHITECTURE FOR THE MISSION SEGMENT DATA DISTRIBUTION." International Foundation for Telemetering, 2003. http://hdl.handle.net/10150/605810.
Full textThe Western Aeronautical Test Range (WATR) Integrated Next Generation System (WINGS) Mission Segment provides data acquisition, processing, display and storage in support of each project’s mission at NASA Dryden Flight Research Center (DFRC). The network architecture for WINGS Mission Segment is responsible for distributing a variety of information from the Telemetry and Radar Acquisition and Processing System (TRAPS), which is responsible for data acquisition and processing, to the Mission Control Centers (MCCs) for display of data to the user. WINGS consists of three TRAPS and four MCCs, where any TRAPS can drive any one or multiple MCCs. This paper will address the requirements for the TRAPS/MCC network and the design solution.
Molina, Ruiz Julio Edgar. "Propuesta de segmentación con redes virtuales y priorización del ancho de banda con QoS para la mejora del rendimiento y seguridad de la red LAN en la Empresa Editora El Comercio Planta Norte." Thesis, Universidad Católica Santo Toribio de Mogrovejo, 2012. http://tesis.usat.edu.pe/jspui/handle/123456789/77.
Full textJašíček, Petr. "Softwarový kontrolér Wi-Fi přístupových bodů se systémem OpenWrt." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2019. http://www.nusl.cz/ntk/nusl-400887.
Full textHermansson, Christopher, and Sebastian Johansson. "Segmentering av lokala nätverk - För mikro- och småorganisationer." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-5903.
Full textSyftet med den här rapporten är att beskriva ett antal olika tillvägagångssätt man kan använda sig av då man har behov av att dela in ett lokalt nätverk i olika segment och med det även kunna reglera trafikflödet mellan segmenten. De lösningar som presenteras i arbetet är inriktade mot mikro- och småföretag.Anledningen till att vi har valt att arbeta med det här området är att vi anser att det är viktigt för organisationer att har en strukturerad och segmenterad design på sitt interna datornätverk.Vi har arbetat genom att i förväg samla in information om olika tekniker som kan tänkas lösa vårt problem, och därefter testat olika scenarion med dessa tekniker. Data har samlats in efter varje genomfört scenario och sammanställts i statistisk form för att kunna avgöra vilken metod som var att föredra.Vi har testat lösningar där man segmenterar nätverket i en lager 2-switch medan man möjliggör och förhindrar trafikflöde mellan segmenten i en router. Även lösningar där man använder en lager 3-switch har testats. På så sätt kan routningen ske direkt i switchen och det blir betydligt mindre belastning i routern. Resultatet visar att då man vill segmentera ett nätverk så är det rekommenderat att man använder sig av VLAN och ACL:er och eventuellt i kombination med en brandvägg.Slutresultatet av rapporten är att en lösning med ”router on a stick” är den billigaste lösningen och troligen den som de flesta mindre företag skulle klara sig med. Vilken lösning man väljer beror dock helt på hur mycket pengar man vill lägga på sitt nätverk samt vad kraven är.
The purpose of this report is to describe a number of approaches that can be used when you are in need of dividing a local area network in a number of segments, and with that also be able to control how data traffic is allowed to traverse between the different segments. The solutions that are presented are focused towards micro and small companies.The reason that we have chosen to work with this matter is that we believe it is important for organizations to have a structured and segmented design of its internal computer network.We have been working by in advance collecting information about various techniques that might solve our problem, and then testing different scenarios using these techniques. Data have been collected after each tested scenario and compiled in statistical form in order to determine which method that was preferable.We have been testing solutions were you segment the network in a layer 2 switch while you allow or deny communication between the segments in a router, and also solutions were you use a layer 3 switch. In that way you can let the routing be performed in the switch, which leads to significantly lower load on the router. The result was that if you are about to segment a local area network it is recommended that you use VLAN and ACL:s, and possibly in combination with a firewall.The final result of this report is that a solution using the “router on a stick”-technique is the cheapest one, and probably the one that most small companies would get along with. However, the solution that you choose depends completely on how much money you want to spend on your network, and also what the needs are.
Brázda, Libor. "Využití virtuálních lokálních sítí pro efektivní a pružný návrh datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2014. http://www.nusl.cz/ntk/nusl-220650.
Full textProscia, Michele. "Sistema di monitoraggio rete layer 2 attraverso ARPwatch." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amslaurea.unibo.it/19117/.
Full textÖgren, Niklas. "Selecting/realization of Virtual Private Networks with Multiprotocol Label Switching or Virtual Local Area Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-93211.
Full textOllé, Karol. "Návrh a simulace podnikové sítě, virtuální laboratoř Cisco." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217547.
Full textHlavatý, Jindřich. "Nové trendy v návrhu datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221063.
Full textSchade, Markus. "Netzentwicklung im CSN." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200401358.
Full textBreiler, Andre. "Differenzierte Bereitstellung von Internetdiensten in öffentlichen Bereichen der Universität." Master's thesis, Universitätsbibliothek Chemnitz, 2001. http://nbn-resolving.de/urn:nbn:de:bsz:ch1-200100099.
Full textKratzert, Sebastian, and Manuel Möller. "Dokumentation Netzwerk Chemnitzer Linux-Tag 2004." Thesis, Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400738.
Full textKraus, Zdeněk. "Modelování a analýza spolehlivosti počítačové sítě VUT." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2011. http://www.nusl.cz/ntk/nusl-237089.
Full textDušek, Jakub. "Penetrační testování ANC." Master's thesis, Vysoké učení technické v Brně. Fakulta podnikatelská, 2021. http://www.nusl.cz/ntk/nusl-444606.
Full textGonçalves, José Pedro Costa. "Estratégias de implementação de redes empresariais." Master's thesis, Universidade de Aveiro, 2014. http://hdl.handle.net/10773/12830.
Full textEste trabalho pretende criar um manual que estabeleça os princí-pios básicos a adotar na conceção de desenhos de redes empresa-riais, sobretudo no que se refere ao balanceamento da sua dispo-nibilidade, segurança e flexibilidade, tendo em atenção os requisi-tos próprios de cada empresa. Com esse intuito, serão apresenta-das estratégias e procedimentos para a implementação de redes multicamada. As estratégias definidas pretendem atingir os seguin-tes objetivos: a implementação de grupos lógicos dentro da rede, o encaminhamento entre os mesmos e a garantia de alta disponibili-dade e redundância da rede. Esta dissertação desenvolve-se em vários momentos, sendo de sublinhar: a apresentação dos concei-tos indispensáveis à compreensão da temática; a análise de topo-logias, com recurso a um software de simulação de redes, a fim de exemplificar a configuração dos vários modelos que podem ser usados na conceção da rede empresarial; a análise de cada um dos cenários estudados.
The goal of this work is to create a manual, establishing the basic principles to adopt in the conception of enterprise network designs, mainly through the balancing of its availability, security and flexibility; taking into consideration the requirements of each company. For that purpose, strategies and procedures for implementation of multilayer networks will be presented. The defined strategies, aim to achieve the following purposes: implementing logical groups within the network, the forwarding between them and ensuring high availability and network redundancy. This essay develops at several moments in which we can highlight: introduction of necessary concepts for the comprehension of the subject¸ simulation of topologies, using a software network simulator, in order to illustrate the configuration of the various models that can be applied in the design of the enterprise network; the analysis of each studied scenarios.
Eisazadeh, Ali Akbar, and Nora Espahbodi. "Fast Fault Recovery in Switched Networks for Carrying IP Telephony Traffic." Thesis, Halmstad University, School of Information Science, Computer and Electrical Engineering (IDE), 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-3859.
Full textOne of the most parts of VOIP management is fault management and, in having a good fault management, finding good mechanisms to detect faults in the network have to be considered.
The main focus of this project is to implement different types of fast fault recovery protocols in networks, especially networks that carry IP telephony. Having a complete understanding of some common link failure detection and fault recovery protocols, such as spanning tree protocol (STP), rapid spanning tree protocol (RSTP) and per-VLAN spanning tree protocol (PVSTP), and also having a complete understanding of three other common techniques for fault detection and fault recovery, such as hot standby routing protocol (HSRP), virtual router redundancy protocol (VRRP) and gateway load balancing protocol (GLBP) will be regarded in the project. We are going to test some fault recovery protocols which can be used in IP telephony networks and choose the best. We intend to focus on this issue in LAN environment in theoretical descriptions and practical implementations.
The final outcome of the thesis is implementation in the Halmstad University’s lab environment to obtain the final result. For doing our thesis, we are going to use some technical tools as hardware tools (Cisco L3 and L2 switches, Routers, IP Phones) and tools which are used for network performance monitoring, like as CommVeiw.
Eriksson, Jhonny, and Joel Karlsson. "Granskning och optimering av data- och IP-telefoninätverk." Thesis, Mälardalen University, School of Innovation, Design and Engineering, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:mdh:diva-9739.
Full textThe company Västra Mälardalens Kommunalförbund, VMKF, wishes to revise and optimize their present data and IP-telephony network as of today consists of the three municipalities Köping, Arboga and Kungsör. As a municipal corporation, they seek consultation regarding internal as well as external review and investigation of the main structure of the network, its functionality and safety. By today’s increasing demands of Internet accessibility, availability of services and security far more extends the requirement of a complete network design. The foundation of networking rests on the balance between each of these necessities. Therefore, it is of grave importance to optimize a network design, use of hardware and to minimize the administrative overhead. In particular, when the municipality is short of resources and time means money. By letting an impartial investigation of the network act as a starting point it was established that several improvement could be applied. Among these a reconstructed and improved network topology that includes subjects as routing, switching, safety and security, quality of service and technical administrative overhead and the implementation of a real time monitoring of network bandwidth consumption.
Företaget Västra Mälardalens Kommunalförbund, VMKF, har önskemål om att granska och optimera deras befintliga data- och IP-telefoninätverk som i dagsläget spänner över de tre kommunerna Köping, Arboga och Kungsör. Som ett kommunalägt företag önskar de konsultation rörande intern såväl som extern granskning och optimering av huvuddelen av nätverkets funktionalitet samt säkerhet. I och med dagens ökade Internetanvändning och funktionalitetsbehov ställs allt högre krav på tillgänglighet, säkerhet och användarvänlighet. Nätverksteknik bygger mycket på balansen mellan dessa tre punkter. Därför gäller det att optimera nätverkets design, hårdvaruanvändning och att minimera administrativa laster. Detta i synnerhet då kommunens resurser är knappa och då tid i dagens samhälle innebär pengar. Genom att låta en granskning över nätverket som det ser ut i dag ligga till grund konstaterades att flertalet förbättringsmöjligheter kunde genomföras. Bland dessa återfinns en omstrukturerad nätverksdesign som innefattar routing, switching, säkerhet, QoS och teknisk administration samt implementeringen av en realtidsövervakning av bandbreddsanvändning.
Vaclík, Michal. "Správa podnikových datových sítí." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2017. http://www.nusl.cz/ntk/nusl-317117.
Full textJanošík, Martin. "Návrh virtuální lokální počítačové sítě pro edukativní účely." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217529.
Full textLichtner, Ondrej. "Networking Subsystem Configuration Interface." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2014. http://www.nusl.cz/ntk/nusl-235421.
Full textLomnický, Marek. "Analýza a demonstrace vybraných L2 útoků." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2009. http://www.nusl.cz/ntk/nusl-236714.
Full textKratochvíl, Petr. "Optimalizace ethernetové sítě ve výrobním podniku." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2020. http://www.nusl.cz/ntk/nusl-413082.
Full textDudek, Jindřich. "Detekce síťových útoků pomocí nástroje Tshark." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2018. http://www.nusl.cz/ntk/nusl-385934.
Full textPrudík, Jiří. "Model metropolitní optické sítě." Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2008. http://www.nusl.cz/ntk/nusl-217666.
Full textScarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.
Full textSilva, Paulo Alexandre de Freitas Branco Guedes da. "Relatório de atividade profissional." Master's thesis, 2014. http://hdl.handle.net/10362/17631.
Full textYen, Peng Kao, and 高燕鵬. "A Study On VLAN Hopping Attack and Defense." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/85327420974340066260.
Full text國防大學中正理工學院
資訊科學研究所
95
This dissertation examines the threats of “VLAN Hopping Attack” and their countermeasures. Different approaches of the hopping attacks on different network environments are studied, implemented, and discussed thoroughly. The VLAN (Virtual Local Area Network) is designed, based on the IEEE 802.1Q standard, to improve the network performance by adequately configuring the software of switches for segmenting broadcast domains, and commonly considered as a “secure network architecture”. Unfortunately, the original design of IEEE 802.1Q does not provide any authentication mechanism on the tag of IEEE 802.1Q frames, which may leave the network under the threats of malicious attacks. We implement various “VLAN Hopping Attack” scenarios on different VLAN structures in order to understand and analyze the attacks in detail. Thereafter a network framework has been proposed as the countermeasures, and implemented in our test-bed. The principle of the proposed solution comes from the idea of “Defense in Depth", and results of the experiment show that our approaches are effective in defending VLAN hopping attack.
Kuo, Mei-Huan, and 郭美奐. "A Web-based network management system of VLAN." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/81347989618638219782.
Full text國立交通大學
資訊管理所
87
The management of network is getting more and more important, as the internet grows rapidly up to now. As we know, the web-based network management system is a new way to manage network whose benefits include of independent platform, ease of operation and the friendly user interface. Based on the internet, we use the technology of Web and Java to build our system so that the network information can be accessed and managed easily and quickly. Besides, the virtual local area network (VLAN) is a technology to divide network into multiply logical workgroups and to configure the environments by means of network management software with no need to change the setting in the router. There are three main objectives on our researches as follows: (1) To learn the architecture of the new generation Web-based network management system, and to use the Web browser with Java to manage VLAN. (2) To study IEEE 802.1Q/D10 draft and understand the operations of VLAN in order to define the management functions and object set of VLAN. (3) To construct a management system of VLAN, and then implement a web-based network management system to promote the correctness and the efficiency of our architecture.
Yeh, Shu-Hwa, and 葉淑華. "The evaluation of VoIP QoS on DiffServ with VLAN networks." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/3w7wd7.
Full text靜宜大學
資訊碩士在職專班
97
Due to more and more popular of Internet, broadband technology was developed. Those make enterprises choose to use the VoIP for saving cost and the demand of VoIP has grown up gradually. However, the VoIP was implemented on Ethernet. Once traffic congestion happened on the network, the quality of communication will be influenced. Therefore, we need to do Qos on network. This thesis focuses on the application techniques and management to discover the characteristics of network protocol and the function of technology. Then, one way for regulating the traffic flow and security will be proposed. The way isolates voice traffic and data traffic on VLAN (Virtual Local Area Network) to avoid influence each other. The classifier and marker mechanism of DiffServ (Differentiated Service) are used to distinguish the service priority between voice and data traffic. Then we raise the priority on voice traffic to reduce the packet delay and lost. Using WRR (Weighted Round Robin Queue) to regulate traffic flow for the bandwidth can be fully used and taken into account transmission of other non-voice data flow at the same time. Besides, we experiment the feasibility of scheme to help network administrators to get a significant planning and configuration while setting up enterprise''s network for promoting the quality of VoIP.
Chang, Shen-Chi, and 張盛智. "Implementation of KMLN VLAN Segment Management using VXLAN and OpenFlow." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/00858132062588191579.
Full text國立中興大學
資訊科學與工程學系
102
Due to the rapid development in cloud computing, virtual machines has been widely deployed in enterprises and in data centers, the demand of resource integration of cross-platform is drastically increasing. Traditional tunneling technology allows flexibly data transmission within a subnet, but it may cause excessively unnecessary broadcast packets over data centers. In addition, the deployment of virtual machine and system configuration set up is laborious, hence it requires an automatic procedure to deal with the cloud management. This study presents the KMLN VLAN Segmentation Management System (K-VSMS) by using KMLN cloud management platform, OpenFlow Controller, and VXLAN tunneling technology. K-VSMS provides an automatic VM deployment, cluster establishment, and centralized segmentation management. We enhance the KMLN platform to include the segmentation management, so a system administrator may efficiently accomplish the establishment of virtual clusters as well as VLAN segments. Through the adoption of VXLAN, which is supported by OpenFlow, and the VM configuration, which is stored in controller database, the OpenFlow controller processes the packet forwarding accordingly for segment partitioning. As compared with two related researches, the proposed system is obviously advantageous in reducing the complexity of configuration set up and is effective in reducing the broadcast traffic.
Chen, Shiuan-jen, and 陳宣禎. "The Design and Implementation of Java-based VLAN Management System." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/21919551783370982401.
Full textChen, Jason, and 陳國貞. "The Design and Implementation of Integrated Multicast Service under VLAN Environment." Thesis, 1999. http://ndltd.ncl.edu.tw/handle/49655957594207857039.
Full textTsai, Yi-Hsueh, and 蔡宜學. "Design of VLAN Based Fat-Tree Multipath Cloud Data Center Networks." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/13653248089973747723.
Full text國立中正大學
通訊工程研究所
103
With the growth of Cloud Service,Data Centers have become an efficient and promising infrastructure for supporting data storage.Data Centers increase the size of data dramatically.However, the traditional tree structure Data Centers network topologies will be unable to support the large data flows.Therefore, Some new network architectures are presented, such as Fat-Tree,BCube and VL2.However, new network architectures have some problems.Because of new network architectures have many redundant paths.When Data Centers run a routing protocol such as Shortest Path Routing or Minimum Spanning Tree,it will be unable to use redundant paths to achive load balancing.In order to increase the transmission capacity and high survivability.Because of Server uses ARP Protocol to learn the MAC addresses of the destination IP addresses.the growth of Server will cause a broadcast storm.Alos, the Switch will increase the size of forwarding tables dramatically.Nevertheless, the Switch can’t handle a large number of Servers and the main limitation of current data center architectures is scalability.Therefore, this paper presents the solution to using MPTCP increasing Cloud network bandwidth and using VLAN based on creating multiple Link-Disjoint paths in Cloud Data Center network.MPTCP can use different VLAN paths to effectively disperse traffic and improve the transmission efficiency. Finally, in order to reduce the ARP broadcast packet and the size of forwarding tables, the integration of SDN designs a new APR packet management method.
HSU, CHUN-CHIN, and 許竣智. "The design and implementation of fuzz testing in VLAN, CWMP and RADIUS." Thesis, 2019. http://ndltd.ncl.edu.tw/handle/8gbxm4.
Full text銘傳大學
資訊工程學系碩士班
107
The fuzz testing is to input the abnormal data into a target machine, and expects the target machine to produce unexpected events, such as crashing or restarting. In this study, we used the fuzz testing to check the vulnerabilities for three network protocols: VLAN, CWMP, and RADIUS. The implementation is divided into four parts. First, to study the network protocol concepts and their operation. Second, the packet format and transmission process of the three protocols are implemented using Python. Third, to implement the core fuzz testing. Fourth, the test packets are sent to the target machine in order to examine whether there is a security vulnerability in these network protocols supported by the target machine. Wireshark is used to observe and analyze the packet contents. The experimental results show that the VLAN tag containing the VLAN IDs 0 and 1 in the test packets are removed and then forwarded to the destination by the switch; VLAN tag containing the VLAN IDs 4095 in the test packets are discarded by the switch. In CWMP, the ACS server responds the different error messages to the test program based on the received packet. In RADIUS, the server will discard the test packets or return the rejected packets to the test program based on whether the received test packets are too long or the numerical value contained in the received test packets is unreasonable.
Pei-WenCheng and 鄭佩汶. "Design and Implementation of a VLAN Tag-translated Mechanism on OpenFlow Networks." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/q2w5h6.
Full text國立成功大學
電腦與通信工程研究所
101
The rapid growth of Internet has driven the IP Network unable to fulfill the evolution of the various demanding services. Building a clean, isolated experimental platform which supports the real networking environment for developing new protocols had become the object of heading to “Future Internet”. In Taiwan, we connected the OpenFlow Networks in universities to build the virtual network upon the existed networking architecture. Although the isolated environment could be achieved by some techniques such as VPLS VPN or tunneling, some limit inside of OpenFlow Network occurred while carrying more resources or experimental applications into the virtual network. Not to mention that the mix environment of Layer 2 and Layer 3 makes the management complicated, it is urgent to develop a control mechanism that could offer flexible management and overcome the limitations. This thesis proposed a control module for managing the extensions of virtual network and implementing a VLAN tag translated mechanism. It provides the transmission for tagged-traffic across the OpenFlow Networks in Taiwan. The mechanism enables the sub-slice assignments with VLAN IDs and also the priority setup for traffics depends on the requirements from applications or services. Through development of this control module, this is the first step toward the future internet and realizes the software-defined network concept.
Salazar, Augusto, and Augusto Salazar. "On Design and Implementation of a Flexible and Portable VLAN Translation Module." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/96930276909783471215.
Full text國立交通大學
資訊科學與工程研究所
100
In IEEE 802.1Q, the Virtual Local Area Network (VLAN) is defined as the creation of a group of hosts that behave as if they were connected on the same LAN. Actual VLAN implementations on Linux do not include a flexible framework for the design and management of a VLAN-aware network. This thesis details the examination of IEEE 802.1Q and proposes a VLAN Translation Module (VTM), which is a software-based solution to provide flexible and portable VLAN implementation for the Linux operating system. The VTM offers a flexible port definition that enables users to establish the desired VLAN environment. In addition, the module offers the possibility of declaring exception rules to modify the behavior of a specific workstation in the VLAN environment. The VTM has a traditionally styled Linux user interface for easier adoption, which provides a sense of control over the configuration. VTM supplies a feature-rich and flexible VLAN implementation, rather than a module aiming for a high-bandwidth and latency-free packet transfer. VTM is implemented at the Kernel level using Netfilter technology, which allows maximum portability to any architecture supported by Linux. Two experiments are conducted to demonstrate the correctness and performance of the VTM. The VTM is compared with existing implementations for maturity, flexibility, portability amount, and other factors. The flexibility and portability of the VTM, in addition to its ability to provide a fresh look at the VLAN standard makes it a valid alternative to the Linux VLAN solution.
Tsai, Yi Da, and 蔡易達. "A Bandwidth Effective and VLAN Support Access Point Design for 802.11 Wireless Infrastructure Networks." Thesis, 2002. http://ndltd.ncl.edu.tw/handle/63567988056562559643.
Full text大葉大學
資訊工程研究所
90
One of the most attractive features of the virtual local area network (VLAN) is the capability to group users from different physical LAN segment into a single broadcast domain. VLANs, thus, facilitate easy administration of logical groups of stations that can communicate as if they were on the same LAN. In addition, the traffic between VLANs is restricted. This limits the propagation of multicast and broadcast traffic between VLANs. These two features make the VLAN more rewarding in the wireless environment where the bandwidth is quite limited and constant moving of the mobile stations is highly anticipated. The goal of this paper is the provision of the VLAN interconnection over the shared medium metropolitan area environment where wired and wireless LAN co-exist. In such a mobile virtual LAN (MVLAN) architecture, after the registration to a specific MVLAN, a mobile station’s broadcast domain should be independent to its current location. For supporting such mobility in metropolitan area environments, we present in this report protocols required in the design of VLAN support access point (VSAP). In particular, a handoff protocol and an MVLAN member tracking protocol are provided to achieve the efficient and transparent handoff of mobile stations over MVLAN.
Kung, Yi-Ming, and 鞏怡明. "A Study on the Operations of Spanning Tree Algorithm and Protocol in the VLAN Environment." Thesis, 1998. http://ndltd.ncl.edu.tw/handle/09633672046122414716.
Full text國立交通大學
資訊管理研究所
86
The Spanning Tree Algorithm and Protocol will configure a simplyconnected active topology from the arbitrarily connected componentsof a Bridged Local Area Network into a single spanning tree,such that there is at most one data route between any two end stations,eliminating data loops.This thesis proposes a Virtual LAN Spanning Tree Algorithm and Protocol.This algorithm is proposed according to the features of Virtual LAN.With the operation of this algorithm, all the members belong to thesame VLAN will be included in an isolated Spanning Tree. And the spann-ing tree formed for a given VLAN will use as many connection devicesthat still not participate in any spanning tree topology before aspossible.
Wu, Hao-Ying, and 吳昊穎. "Integrating MPTCP Subflow Management and VLAN-Based Multi Paths with Openflow in a Cloud Network." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/ecbbzq.
Full text國立中正大學
通訊工程研究所
103
With the growth of Cloud Service, Data Centers have become an efficient and promising infrastructure for supporting data storage. Data Centers increase the size of data dramatically. However, the traditional tree structure Data Centers network topologies will be unable to support the large data flows. Therefore, Some new network architectures are presented, such as Fat-Tree, BCube and VL2. However, new network architectures have some problems. Because of new network architectures have many redundant paths. When Data Centers run a routing protocol such as Shortest Path Routing or Minimum Spanning Tree, it will be unable to use redundant paths to achive load balancing. In order to increase the transmission capacity and high survivability. Therefore, this paper presents using VLAN based on creating multiple Link-Disjoint paths in Cloud Data Center network. Through MPTCP Subflow management and VLAN assign algorithm increase Cloud network bandwidth. Finaily using OpenFlow integrated MPTCP subflow and VLAN-Based Cloud Network, Let MPTCP subflow can use different VLAN paths to effectively disperse traffic and improve the transmission efficiency and achieve fault tolerance.
Müller, Jean-Alexander. "ATM versus Gigabit Ethernet im TCP/IP-LAN. Design und Implementierung eines Hochgeschwindigkeitsnetzwerkes für TCP/IP." 1998. https://ul.qucosa.de/id/qucosa%3A16470.
Full text