Advanced search

Showing result 1 - 5 of 21 essays matching the above criteria.

  1. 1. Replicating data stored in NSO to an external database for offline analysis : Methods for replicating varied data sets, synchronisation, and database backend

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Lisa Bevemyr; [2022]
    Keywords : ;

    Abstract : There is no specific tool to copy data from NSO to an external database continuously. NSO is a system which is used to handle settings on multiple devices using one interface. By providing the option to mirror NSO to an external database, information becomes more accessible and opens ups for the possibility of analyzing historical data. READ MORE

  2. 2. Performance Analysis of an SD-WAN Infrastructure Implemented Using Cisco System Technologies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Gianlorenzo Moser; [2021]
    Keywords : SD-WAN; SDN; MPLS; Load Balancing; Traffic Shaping; SD-WAN; SDN; MPLS; Load Balancing; Traffic Shaping;

    Abstract : Software-Defined Wide Area Networking (SD-WAN) is an emerging technology that has the potential to satisfy the increasing demand for reliable and efficient Wide Area Networks (WANs) in the enterprise-network market. This thesis focuses on the main features of an SD-WAN network and on the technical challenges facing the design and implementation of an SD-WAN infrastructure. READ MORE

  3. 3. A Comparison of Pull- and Push- based Network Monitoring Solutions : Examining Bandwidth and System Resource Usage

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Pettersson; [2021]
    Keywords : Simple Network Management Protocol; Telemetry; Network Monitoring; Protocol Buffers; gRPC; Simple Network Management Protocol; Telemetri; Nätverk; Övervakning; Protocol Buffers; gRPC;

    Abstract : Monitoring of computer networks is central to ensuring that they function as intended, with solutions based on SNMP being used since the inception of the protocol. SNMP is however increasingly being challenged by solutions that, instead of requiring a request-response message flow, simply send information to a central collector at predefined intervals. READ MORE

  4. 4. Improving the Cyber defence of an organisation based on IP Geolocation and security appliances

    University essay from Högskolan Väst/Avdelningen för Matematik, Data- och Lantmäteriteknik

    Author : Aleksandar Opasinov; Sina Eftekhari; [2020]
    Keywords : Cybersecurity; Cisco ASA Firewall; IP Geolocation; Malware; Cyber Attacks; IPS; IT-säkerhet; Cisco ASA Brandvägg; IP Geolocation; Malware; Cyberattacker; IPS;

    Abstract : As advancement and usage of data communication has increased exponentially on a global scale, with a devastating exposure to attacks and varying security threats to home offices as well as to large enterprises, there is always a need for enhanced network protection. The IT department of the company OneDefence, located in western Sweden, was chosen for the thesis and based on the stated information from the organisation, aims were set on how to improve their network defence capabilities. READ MORE

  5. 5. Implementing an Address System in Uganda : How will it Affect Commerce?

    University essay from KTH/Industriell ekonomi och organisation (Inst.)

    Author : THERESE JERNBECK; [2018]
    Keywords : Uganda; address system; digital solution; infrastructure; commerce; Uganda; adressystem; digitala lösningar; infrastruktur; handel;

    Abstract : Uganda is a low-income country in eastern Africa which has experienced social and economic improvements since the mobile phone was launched (Deloitte, GSMA, and Cisco, 2012). The positive attitude towards mobile solutions contributes to the country´s growth in the international world, even if some circumstances are blocking the full potentials (African Development Bank, 2014). READ MORE