Auto-configuration of Cisco routers with application software
Prado, Alexandre Barcellos
Gibson, John H.
MetadataShow full item record
The context of this research is to facilitate the control of routers with the Server and Agent based Active Network Management (SAAM), to optimize allocation of network resources, and to satisfy user Quality of Service (QoS) requirements. The SAAM network determines the Quality of Service parameters based on current network conditions and user requirements. These parameters are dynamic, so they must be uploaded into the Cisco routers to take effect. The focus is on determining the most efficient way of communicating between the Cisco routers and the SAAM system. This is accomplished by several key components of the proxy-based solution as the first step for integrating with a legacy network. This thesis develops methods and application software to automatically update the configurations of Cisco routers based on the current network condition. These methods are required by any solution that resolves to upgrade the existing legacy network to provide QoS without expensive equipment replacement. As a result users are provided with a network they can expect to function properly.
Approved for public release, distribution unlimited
Showing items related by title, author, creator and subject.
Kaplan, Namik (Monterey, California. Naval Postgraduate School, 1999-03-01);A new network management system named Server and Agent based Active Management (SAAM) has been proposed. SAAM can locate and fix network problems much more quickly than today's systems. Stand-alone routers are used in ...
Luckie, Matthew; Beverly, Robert (ACM, 2017-08-21);We propose and evaluate a new metric for understanding the dependence of the AS-level Internet on individual routers. Whereas prior work uses large volumes of reachability probes to infer outages, we design an efficient ...
Kronzilber, Dor (Monterey, California: Naval Postgraduate School, 2017-09);We model attacks against computer networks in the cyber domain from the attacker’s point of view. We consider an attacker with limited resources and time, whose goal is to maximize the expected reward earned by exploiting ...