Essays about: "thesis snmp"
Showing result 1 - 5 of 9 essays containing the words thesis snmp.
-
1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS
University essay from Högskolan i Halmstad/Akademin för informationsteknologiAbstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE
-
2. A Comparison of Pull- and Push- based Network Monitoring Solutions : Examining Bandwidth and System Resource Usage
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Monitoring of computer networks is central to ensuring that they function as intended, with solutions based on SNMP being used since the inception of the protocol. SNMP is however increasingly being challenged by solutions that, instead of requiring a request-response message flow, simply send information to a central collector at predefined intervals. READ MORE
-
3. Monitoring of a Modelled Real-Time System : with Data Diode Enabled Unidirectional Network
University essay from Linköpings universitet/Institutionen för datavetenskapAbstract : Monitoring and logging is fundamental in systems. Today, these techniques are widely used to detect functionality issues as well as malicious event. This thesis compares and evaluates two techniques commonly used for this purpose: the Simple Network Management Protocol (SNMP) and the Syslog protocol. READ MORE
-
4. Integrating Monitoring Systems - Pre-Study
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : Failures in networks that reside in business environments cause harm to organizations depending on them. Every minute of inoperativety is hurtful and as a network adminstrator you want to minimize the rates of failures as well as the time of inoperation. Therefore, a fruitful network monitoring system is of great interest for such organizations. READ MORE
-
5. IPv6 Monitoring and Flow Detection
University essay from Blekinge Tekniska Högskola/Sektionen för datavetenskap och kommunikationAbstract : IPv6 Privacy extensions, implemented in major operating systems, hide user’s identity by using a temporary and a randomly generated IPv6 addresses rather than using the former, EUI-64 format where the MAC address is part of the IPv6 address. This solution for privacy has created a problem for network administrators to back-trace an IPv6 address to a specific MAC address, since the temporary IP address used once by the node is removed from the interface after a period of time. READ MORE