The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper focuses on research device management mechanisms such as routers and switches, based on the NETCONF protocol, considered user authentication mechanisms using RADIUS-server and implementation of these mechanisms in currently being developed Eltex Network OS. Reflected the main features of NETCONF protocol — Network Configuration Protocol, produced theoretical and experimental comparison...
With the growth of Infrastructure as a Service (IaaS) in cloud computing, and the Internet of Things (IoT), network monitoring of the global infrastructure will continue to expand, as cybersecurity will become of primary importance. Current network monitoring approaches, particularly those that are agent-based, are proprietary, costly, and may not scale. This paper proposes a lightweight, scalable...
In order to realize the real-time collection of network information, to achieve energy saving and fault monitoring, it puts forward a method of monitoring the power consumption information based on the network data analysis. The method can use SNMP and MIB to collect the power information of the power equipment in different networks, including the CPU occupancy rate, physical and virtual memory usage...
In presented paper we describe a design and implementation of an information system based on base of embedded client and Linux application server architecture. Presented information system serves for remote collection, storing and processing information on the number of carried out mechanical cycles for group of older existing fatigue test machines in an automotive components production. This upgrade...
In Europe, ICT equipment and services account for 2.5%-4% for EU's carbon emissions. According to the Smart2020 report by the Global e-Sustainability Initiative, GeSI (2008), the ICT sector's emissions are expected to increase, from 0.53 billion tonnes (Gt) carbon dioxide equivalent (CO2e) in 2002 to 1.43 GtCO2e in 2020 (in Business As Usual, BAU, scenario). Thus, energy efficiency is a key research...
Different architectures of interactions between the objects in the Internet of Things have been proposed, based on direct exchange of data between the wireless devices or based on synchronization with fixed network devices or cloud infrastructure. We evaluated how the selection of the communication architecture influences the performance of the data exchange using discrete event simulation. The distribution...
Simple Network Management Protocol (SNMP) is the protocol which has the capability to monitor the performance of IP based devices. Also it can monitor components installed on these devices to determine whether they are working or not. In an environment with hundreds of installed servers, it is not possible to check if each machine is working properly. SNMP can also be a used in cloud computing environment...
Since the cloud computing technology is commonly developed, some new inventions of the Internet are required to operate in hybrid architecture with both virtualized and physical components. To evaluate these kinds of innovations in testbeds, the ability of emulation is the key point. This paper presents a prototype design implemented in a network testbed for providing virtual nodes. By doing this,...
In today's digital era with the development of various types of gadgets causes the growth of traffic and the number of internet service on the network. To provide the maximum monitoring system that can determine service availability, network conditions, uptime and downtime. Protocol monitoring system used in this research is the Simple Network Management Protocol (SNMP). Due to the use of SNMP protocol...
Today few organizations have a thorough understanding of what is on their networks at any given time. This study tries to develop Computer and Network Asset Manager (CNAM) that is a network management application which helps large enterprises, and Small medium enterprises (SMEs) service providers, manage their data centers and IT infrastructure efficiently and cost effectively. CANM collects information...
The enlargement of the current enterprise network scale makes the conflict between application systems and network devices inevitable. To address this issue, this paper proposed a verification method of network reach ability based on topology path. Our approach extracts communication need of application systems through formalization method, so the problem of whether the communication need will be...
The IPv6 protocol adaptation for the Wireless Sensor Network (6LoWPAN) enables the reuse of the TCP/IP application layer in WSN environment. It has been shown that the Simple Network Management Protocol (SNMP) originally envisioned for monitoring & managing hosts on the internet can be adapted for the 6LoWPAN networks. Also, IETF Constrained Application Protocol (CoAP), designed specifically for...
The Hard Real-Time Ethernet Switch (HaRTES) allows using the same network to handle multiple traffic flows, without compromising the performance of real-time applications. Furthermore, it also provides flexible and on-line scheduling techniques with admission control capabilities, thus real-time communications flows can be added, removed and updated online with strict temporal isolation. However,...
Active network measurements play an important role not only in network monitoring for OAM purposes, but also in assessing the current network status and providing real-time information for the optimization of applications. This paper proposes the extension of SNMP-based monitoring mechanisms to also support active in-network measurements conforming to the standardized OWAMP protocol. A specialized...
Current management models based on client/server suffer from scalability and flexibility problems. Furthermore, the staleness of gathered data (due to network latency involved) and probable error in the selection of management task being carried over (owing to the staleness of data) reduces the reliability of the management applications. In this sense, use of mobile agents offer many possibilities...
Simple Network Management Protocol “SNMP”, which is a component of the Internet Protocol Suite, is the most widely-used protocol in network management systems today. It is used to monitor network-attached devices such as routers, switches, Servers, workstations, printers, etc., for conditions that warrant administrative attention. In its initial versions, SNMPv1 and SNMPv2, SNMP was criticized for...
It is very tedious and trivial if a network administrator has to manage all the equipment manually. Unfortunately, there are usually numerous and heterogeneous devices over which an administrator must watch. This paper proposes the design and development of an automatic event-driven system to reduce the burden on network administrators. By allowing managers to pre-define the action of some conditions,...
Wireless sensor networks (WSNs) have received lots of attention in recent years. WSNs have been applied to multiple fields such as video surveillance, home automation, and health care. How to efficiently manage WSN devices thus becomes an important issue. Simple Network Management Protocol (SNMP) is an IP-based network management protocol which can collect and modify management information from network...
As the foundation of network management technology, Network topology has been always the research hotspot which reflects the basic characteristic of a network, so from its topology, you can figure out the bottleneck and hidden security problems of a network easily and quickly. The technology of network topology visualization is such a technique that it researches on network topology by discovering,...
With the rapid growth of cloud computing, a great number of servers are deployed in a data center to provide virtual machines to a variety of users. Several virtualization techniques have been developed in the recent years. Platforms for virtual machines, e.g. VMware, Xen, KVM, and VirtualBox, may adopt different virtualization techniques for particular purposes. This leads to a heterogeneous virtual...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.