Sök:

Sökresultat:

6184 Uppsatser om Virtual local area network - Sida 13 av 413

Lastbalanseringsalgoritmer : En utvärdering av lastbalanseringsalgoritmer i ett LVS-kluster där noderna har olika operativsystem

Denna rapport behandlar en undersökning av olika lastbalanseringsalgoritmer i Linux Virtual Server. Undersökningen har gjorts i ett webbkluster (Apache var webbservern som användes) med tre heterogena noder, där operativsystemet var den detalj som skiljde dem åt. Operativsystemen som ingick i undersökningen var Windows Server 2008 R2, CentOS 6.2 och FreeBSD 9.0. De faktorer som undersöktes mellan de olika algoritmerna var klustrets genomsnittliga svarstid vid olika belastning och hur många anslutningar som kunde hanteras av klustret, detta gjordes med verktyget httperf.Undersökningen ger svar på hur ett heterogent webbklusters genomsnittligasvarstid och arbetskapacitet kan skilja sig åt beroende på vilken algoritm som används för lastbalansering. Resultatet visar att den genomsnittliga svarstiden håller sig låg tills en hastig stigning inträffar.

Acceptansgränsen för solceller i lågspänningsnät : Kan den ökas?

Microproduction, also called distributed generation, is something that has become more and more popular in the electric grid. Microproduction can however lead to unacceptable performance if several units are installed in the same low voltage network. It is therefore good to know a limit where the performance of the low voltage network becomes unacceptable based on given parameters. This limit is usually called hosting capacity.In this report the hosting capacity with respect to voltage and current have been studied in three low voltage networks which are located in Falu Elnäts concession area. This has been done by simulations in a GIS-program where critical times of the grid have been simulated.

Strategi och struktur i småbarns byggprocess : Vilka erfarenheter har småbarn av byggklossars form och balans?

I dagens samhälle har många kundföretag problem med datalagringen vilket beror på att behovet av att lagra data började öka kraftigt under 2000-talet och har fortsatt öka sedan dess. När kundföretagen började använda sig av virtualisering så expanderade även datastorleken. I samband med att datastorleken växte ville företagen att data inte skulle lagras lokalt utan att den skulle vara lagrad på en central plats som en serverhall och vara överskådlig.Studien utfördes på tre sätt, först undersöktes vilka datalagringslösningar som fanns och det skedde genom litteraturstudier. Därefter kontaktades företag som använde olika lösningar för datalagring. Nästa steg var att kontakta de leverantörer som kundföretag använde sig av och som levererade lösningarna.Under arbetets gång upptäcktes olika lösningar på problematiken med ett ökat datalagringsbehov.

Editing, Streaming and Playing of MPEG-4 Facial Animations

Computer animated faces have found their way into a wide variety of areas. Starting from entertainment like computer games, through television and films to user interfaces using ?talking heads?. Animated faces are also becoming popular in web applications in form of human-like assistants or newsreaders. This thesis presents a few aspects of dealing with human face animations, namely: editing, playing and transmitting such animations.

Vindkraftens påverkan på sin omgivning : En fallstudie

Purpose of this thesis is to study the impact of wind turbines on their surroundings. It also aims to analyze how the communication looks between the authorities, the planner and local residents prior to the establishment of wind turbines in Lännäs/Odensbacken in Örebro, where three wind turbines set up in a group.The results of this survey show that the participants experience themselves not as especially disturbed of the turbines in the form of large noise, shadows, and sleep disturbance indoors and outdoors. Participants felt that no change had taken place on the natural environment (52%) since the turbines became operational. It was 49% of participants had got no information about the establishment of Örebro Municipality, Örebro County Administrative Board or Wind Power Company. Scientists/­experts had the highest confidence of 86%, politicians and the media/journalists had least confidence.

Nätverksdemokrati -vad bör, är, kan den vara

The main objective of the essay is to define the meaning of the termgovernance network on the basis of democratic values ? both normative andimperial - with the aim to analyse the prospects to develop an effective anddemocratic governance. Democratic values as well as civil participation,enlightenment, responsibility and approachability are discussed, but also moreeffectivness orientated values.It is clear from the presentation how normative and democracy models putdifferent values in focus, with the consequence that other values are played downor pushed aside. Compared to imperial research in partnership ? by definition atype of network arrangement - and with a starting point in democracy andefficiency, the networks are discussed as political formation.In what sense can the actual existing network arrangements meet and fulfil thedefined political values? As no straight forward answer exists, there is an ongoingconflict between the political demand for slowness and the effectiveness demandfor flexibility and mobility..

Fredrik Reinfeldt och Jimmie Åkesson : Om hur två partiledare framställs under eftervalsperioden 2010

Frågan om verkligheten och dess beskaffenhet har länge orsakat stor förbryllning hos människan, vilken historiskt sett har försökt förklarats på olika sätt. Inte minst genom olika slags gudaläror. Idag lever vi helt annorlunda än vad vi gjorde för exempelvis 1000 år sedan. Det är inte längre gudar som är den dominerande verkligheten ? det är IT-tekniken.

Vikten av säkra nätverk

The purpose of this thesis is to show how to use vulnerability testing to identify and search for security flaws in networks of computers. The goal is partly to give a casual description of different types of methods of vulnerability testing and partly to present the method and results from a vulnerability test. A document containing the results of the vulnerability test will be handed over and a solution to the found high risk vulnerabilities. The goal is also to carry out and present this work as a form of a scholarly work.The problem was to show how to perform vulnerability tests and identify vulnerabilities in the organization's network and systems. Programs would be run under controlled circumstances in a way that they did not burden the network.

En kvalitativ studie om före detta kriminellas upplevelser av stöd och hjälp.

The aim of this study was to examine former criminals? experiences of help and support of importance to leave a criminal life style. The study consists of six interviews with former criminals and earlier studies on the subject. These studies show that relapse in crime are most common among those who are socially excluded from society. They also show that important factors to end a life in criminality are for example a supportive social network.

How Venture Capitalists can use their Network in order to reduce the Information Asymmetries between themselves and the Venture Management Team

The purpose of this study is to increase the understanding of how venture capitalists can use their network in order to reduce information asymmetries between themselves and the venture management team. A qualitative approach with semi-structured interviews, consisting of open questions, have been used to receive gradate information in order to reach our explorative purpose. Our theoretical framework consists of relevant studies made on the dynamics of networks and the problems that can arise in the complex relationship between a principal and an agent. We have been interviewing two venture capital firms and therepresentatives from two business angel networks. We also made an additional interview with an influential financial actor in order to try to verify our conclusions Our conclusions are that an extensive network can be used by venture capitalists in order to; verify ventures? technologies, complement the competences in the venture management team, and arrange co-investments, resulting in reduced information asymmetries between themselves and the venture management team.

Chatt och e-post : ett möte på folkbibliotekets publika datorer?

Ten years ago the public computers with Internet access were introduced in the public libraries. The purpose of the public computers was to give the possibility of searching information. Along with the Internet came also communication media like chat and e-mail. This type of communication was a new function for the libraries and the reactions among the librarians were mixed. It has been a source of big frustration and attempts to block it has not succeeded.

Nationell naturvård i en lokal kontext : En analys av ett nationalparksförslag i Södra Jämtlandsfjällen

Local participation in nature conservation has gained more attention over the last decades due to international conventions as well as local and national initiatives. This development can be seen as a reaction to a more expert oriented nature conservation characterized by centralized control and strict preservation of so called "original" nature. The overall objective of this thesis is to contribute to research on new forms of conservation where democracy and local participation is included. The case study focuses on the process of producing a pre-study for a suggested national park in southern Jämtland in the Swedish mountain region, and aims to investigate to what extent local participation was included. The pre-study was led by the Swedish Environmental Protection Agency (SEPA) and the County Administrative Board (CAB) in Jämtland.

Vilken betydelse har ett filialbibliotek? exempel Högsby

The purpose of the present thesis is to investigate the interaction between the branches in the different villages and its users and the importance of the branches for democracy. To illustrate these points, I have focused on Högsby municipality, a local council in Kalmar county. Högsby municipality is of particular interest in this connection, since all seven of the branches have been closed recently; only the main library remains. Moreover, three of the closed branches were, in 2005, taken over by citizen organizations local to the part of Högsby municipality where the libraries were located. The specific issues that were addressed were:- What needs were satisfied by the local libraries in Högsby council and is it possible to satisfy these needs in other ways and then, how?- Does the absence of a local library affect democracy?Interviews were performed.

En studie av fyra kommuners måldokument gällande den offentliga kulturverksamheten med fokus på biblioteksverksamheten

The aim of this study has been to explore local cultural policy documents in some municipalities in the geographical region of Västra Götaland. Do the municipalities have these kinds of documents for their local cultural activities, and how are they designed? These are questions which the study has focused on. The study has been concentrated on the library activity in the local cultural policy documents. The research has been a comparative one.

Analys av datakommunikationssäkerhet för VoIP-protokoll

Voice over IP (VoIP) is a relatively new technology that enables voice calls over data networks.With VoIP it is possible to lower expenses, and increase functionality and flexibility. FromSwedish Armed Forces point of view, the security issue is of great importance, why the focus inthis report is on the security aspect of the two most common open-source VoIP-protocols H.323and SIP, some of the most common attacks, and counter-measures for those attacks.Because of the level of complexity with a network running H.323 or SIP, and the fact that it hasyet to stand the same level of trial as of traditional telephony, a VoIP-system includes manyknown security-issues, and probably at present many unknown security flaws.The conclusion is that it takes great knowledge and insight about a VoIP-network based onH.323 or SIP to make the network satisfyingly safe as it is today, and is therefore perhaps not asuitable solution for the Swedish Armed Forces today for their more sensitive communications..

<- Föregående sida 13 Nästa sida ->