975 resultados para Enterprise Networks


Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Security administrators face the challenge of designing, deploying and maintaining a variety of configuration files related to security systems, especially in large-scale networks. These files have heterogeneous syntaxes and follow differing semantic concepts. Nevertheless, they are interdependent due to security services having to cooperate and their configuration to be consistent with each other, so that global security policies are completely and correctly enforced. To tackle this problem, our approach supports a comfortable definition of an abstract high-level security policy and provides an automated derivation of the desired configuration files. It is an extension of policy-based management and policy hierarchies, combining model-based management (MBM) with system modularization. MBM employs an object-oriented model of the managed system to obtain the details needed for automated policy refinement. The modularization into abstract subsystems (ASs) segment the system-and the model-into units which more closely encapsulate related system components and provide focused abstract views. As a result, scalability is achieved and even comprehensive IT systems can be modelled in a unified manner. The associated tool MoBaSeC (Model-Based-Service-Configuration) supports interactive graphical modelling, automated model analysis and policy refinement with the derivation of configuration files. We describe the MBM and AS approaches, outline the tool functions and exemplify their applications and results obtained. Copyright (C) 2010 John Wiley & Sons, Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Part 15: Performance Management Frameworks

Relevância:

70.00% 70.00%

Publicador:

Resumo:

RESTful services gained a lot of attention recently, even in the enterprise world, which is traditionally more web-service centric. Data centric RESfFul services, as previously mainly known in web environments, established themselves as a second paradigm complementing functional WSDL-based SOA. In the Internet of Things, and in particular when talking about sensor motes, the Constraint Application Protocol (CoAP) is currently in the focus of both research and industry. In the enterprise world a protocol called OData (Open Data Protocol) is becoming the future RESTful data access standard. To integrate sensor motes seamlessly into enterprise networks, an embedded OData implementation on top of CoAP is desirable, not requiring an intermediary gateway device. In this paper we introduce and evaluate an embedded OData implementation. We evaluate the OData protocol in terms of performance and energy consumption, considering different data encodings, and compare it to a pure CoAP implementation. We were able to demonstrate that the additional resources needed for an OData/JSON implementation are reasonable when aiming for enterprise interoperability, where OData is suggested to solve both the semantic and technical interoperability problems we have today when connecting systems

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Academic researchers have followed closely the interest of companies in establishing industrial networks by studying aspects such as social interaction and contractual relationships. But what patterns underlie the emergence of industrial networks and what support should research provide for practitioners? First, it appears that manufacturing is becoming a commodity rather than a unique capability, which accounts especially for low-technology approaches in downstream parts of the network, for example, in assembly operations. Second, the increased tendency towards specialisation has forced other, upstream, parts of industrial networks to introduce advanced manufacturing technologies for niche markets. Third, the capital market for investments in capacity, and the trade in manufacturing as a commodity, dominates resource allocation to a larger extent than was previously the case. Fourth, there is becoming a continuous move towards more loosely connected entities that comprise manufacturing networks. Finally, in these networks, concepts for supply chain management should address collaboration and information technology that supports decentralised decision-making, in particular to address sustainable and green supply chains. More traditional concepts, such as the keiretsu and chaibol networks of some Asian economies, do not sufficiently support the demands now being placed on networks. Research should address these five fundamental challenges to prepare for the industrial networks of 2020 and beyond. © 2010 Springer-Verlag London.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

Purpose – The purpose of this paper is to examine challenges and potential of big data in heterogeneous business networks and relate these to an implemented logistics solution. Design/methodology/approach – The paper establishes an overview of challenges and opportunities of current significance in the area of big data, specifically in the context of transparency and processes in heterogeneous enterprise networks. Within this context, the paper presents how existing components and purpose-driven research were combined for a solution implemented in a nationwide network for less-than-truckload consignments. Findings – Aside from providing an extended overview of today’s big data situation, the findings have shown that technical means and methods available today can comprise a feasible process transparency solution in a large heterogeneous network where legacy practices, reporting lags and incomplete data exist, yet processes are sensitive to inadequate policy changes. Practical implications – The means introduced in the paper were found to be of utility value in improving process efficiency, transparency and planning in logistics networks. The particular system design choices in the presented solution allow an incremental introduction or evolution of resource handling practices, incorporating existing fragmentary, unstructured or tacit knowledge of experienced personnel into the theoretically founded overall concept. Originality/value – The paper extends previous high-level view on the potential of big data, and presents new applied research and development results in a logistics application.

Relevância:

70.00% 70.00%

Publicador:

Resumo:

The telecommunication industry is entering a new era. The increased traffic demands imposed by the huge number of always-on connections require a quantum leap in the field of enabling techniques. Furthermore, subscribers expect ever increasing quality of experience with its joys and wonders, while network operators and service providers aim for cost-efficient networks. These requirements require a revolutionary change in the telecommunications industry, as shown by the success of virtualization in the IT industry, which is now driving the deployment and expansion of cloud computing. Telecommunications providers are currently rethinking their network architecture from one consisting of a multitude of black boxes with specialized network hardware and software to a new architecture consisting of “white box” hardware running a multitude of specialized network software. This network software may be data plane software providing network functions virtualization (NVF) or control plane software providing centralized network management — software defined networking (SDN). It is expected that these architectural changes will permeate networks as wide ranging in size as the Internet core networks, to metro networks, to enterprise networks and as wide ranging in functionality as converged packet-optical networks, to wireless core networks, to wireless radio access networks.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Hoje em dia, distribuições de grandes volumes de dados por redes TCP/IP corporativas trazem problemas como a alta utilização da rede e de servidores, longos períodos para conclusão e maior sensibilidade a falhas na infraestrutura de rede. Estes problemas podem ser reduzidos com utilização de redes par-a-par (P2P). O objetivo desta dissertação é analisar o desempenho do protocolo BitTorrent padrão em redes corporativas e também realizar a análise após uma modificação no comportamento padrão do protocolo BitTorrent. Nesta modificação, o rastreador identifica o endereço IP do par que está solicitando a lista de endereços IP do enxame e envia somente aqueles pertencentes à mesma rede local e ao semeador original, com o objetivo de reduzir o tráfego em redes de longa distância. Em cenários corporativos típicos, as simulações mostraram que a alteração é capaz de reduzir o consumo médio de banda e o tempo médio dos downloads, quando comparados ao BitTorrent padrão, além de conferir maior robustez à distribuição em casos de falhas em enlaces de longa distância. As simulações mostraram também que em ambientes mais complexos, com muitos clientes, e onde a restrição de banda em enlaces de longa distância provoca congestionamento e descartes, o desempenho do protocolo BitTorrent padrão pode ser semelhante a uma distribuição em arquitetura cliente-servidor. Neste último caso, a modificação proposta mostrou resultados consistentes de melhoria do desempenho da distribuição.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

A new niche of densely populated, unprotected networks is becoming more prevalent in public areas such as Shopping Malls, defined here as independent open-access networks, which have attributes that make attack detection more challenging than in typical enterprise networks. To address these challenges, new detection systems which do not rely on knowledge of internal device state are investigated here. This paper shows that this lack of state information requires an additional metric (The exchange timeout window) for detection of WLAN Denial of Service Probe Flood attacks. Variability in this metric has a significant influence on the ability of a detection system to reliably detect the presence of attacks. A parameter selection method is proposed which is shown to provide reliability and repeatability in attack detection in WLANs. Results obtained from ongoing live trials are presented that demonstrate the importance of accurately estimating probe request and probe response timeouts in future Independent Intrusion Detection Systems.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Dissertation presented to obtain the degree of Doctor in Electrical and Computer Engineering, specialization on Collaborative Enterprise Networks

Relevância:

60.00% 60.00%

Publicador:

Resumo:

El concepto de coopetencia surgen los planteamientos relacionados con los clústers y las redes empresariales, en donde empresas con características similares fortalecen sus relaciones para desarrollar mayores niveles de eficiencia o alcanzar objetivos que individualmente serian difíciles de lograr, especialmente en el caso de las pymes. Es fundamental que el estado desarrolle las relaciones y la conformación de iniciativas de asociatividad que permitan que la fluidez y los vínculos entre empresas, instituciones gubernamentales, financieras, universidades, centros de investigación, entre otros; para promover la integración de esfuerzos, la fluidez de información y el acceso a tecnologías, mejores posiciones competitivas. En Colombia desde hace aproximadamente 20 años, dentro de la política de competitividad del gobierno nacional (a partir del informe monitor), se ha identificado la importancia de las relaciones entre empresas e instituciones conexas para mejorar los estándares y la eficiencia que se pueda lograr para mantener una posición competitiva en los mercados internacionales.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Esta investigación está orientada hacia la identificación de características de la internacionalización de la economía colombiana, específicamente en el sector de la construcción, los cuales han logrado otorgarle un especial dinamismo durante esta última década. En el desarrollo del documento se evalúan los modelos de internacionalización basados principalmente en tres temas fundamentales; el primero es la teoría económica, el segundo es la teoría como proceso, y por último la teoría de redes. Cada uno de estos modelos basados en su respectiva teoría, enseñan conceptos de cómo podrían las empresas implementar planes para entrar a otros mercados, empezando por países similares tanto en aspectos sociales, económicos, culturales, y políticos, logrando así de esta manera una posición aventajada frente a sus competidores. Al lograr este posicionamiento pueden empezar su expansión a países más lejanos puesto que ya han conocido y fortalecido sus ventajas competitivas, obteniendo una mayor experiencia de adaptación a nuevos mercados, con esto alcanzando captar mayores recursos económicos, de conocimiento y de otras índoles que ayudan a disminuir el riesgo de inversión que realizan las organizaciones en diferentes naciones.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Ante la globalización y las nuevas tendencias de consumo que se han venido desarrollando a través de los años, las diferentes firmas en el mundo se han visto en la necesidad de buscar estrategias que les permita ser productivas generando más valor a los consumidores. En este sentido, ha surgido la necesidad de trabajar de manera conjunta y a su vez crear lazos de cooperación entre las diferentes organizaciones para el logro de mejores resultados. Las redes empresariales son una opción de integración de procesos y recursos para las organizaciones, sin embargo durante la creación de esta se generan cambios organizacionales que impactan en factores como la cultura organizacional. El cambio en la cultura organizacional se produce de manera gradual o abrupta según la forma de cooperación que ejecuten las empresas o por el contexto externo al cual pertenezca la organización. Así mismo, el líder es el encargado de gestionar el cambio en los valores (núcleo de la cultura), prácticas o la filosofía de las organizaciones; sin el apoyo de los líderes el fracaso de una cultura organizacional en una empresa, red, clúster o alianza será incuestionable.

Relevância:

60.00% 60.00%

Publicador:

Resumo:

Este estudio tiene como objetivo identificar cuáles son las variables que repercuten en la efectividad de las redes empresariales. Esto, con base en la búsqueda de literatura existente de la efectividad en equipos, en organizaciones y en las redes interorganizacionales, así como el análisis de modelos y estudios empíricos que permitieron el análisis. De acuerdo con la búsqueda, se encontró que variables como la estructura de la red, la estabilidad del sistema, el compromiso de los empleados en cada una de las organizaciones que hacen parte de la red, la confianza dentro de la red, la transferencia de conocimiento y la apertura del sistema son las variables que en conclusión, mostraron ser buenas predictoras de efectividad dentro de las redes empresariales.