'n Generiese rekenaarnetwerkbestuursmodel vir die Suid-Afrikaanse bankomgewing
- Authors: Van Velzen, Abraham
- Date: 2015-03-17
- Subjects: Computer networks - Management , Banks and banking - Data processing
- Type: Thesis
- Identifier: uj:13428 , http://hdl.handle.net/10210/13465
- Description: M.Com. (Informatics) , This dissertation examines the field of network management in a banking environment. Special attention is given to business aspects that might influence network management. Technical aspects of network management are only discussed briefly. The study is broadly divided into two sections, the theoretical background and the formulation of a network model in the banking environment. Banks require that their services must always be of the highest standard. Special attention is given to services that banks provide on a daily basis. Network management can become very technical and complex. Large networks can become a nightmare to manage without proper business management principles. The dissertation offers an introduction to business principles and concentrates on different environments that might influence banks and their networks. The study indicates the importance of the open system environment for banks. The success of open systems largely depends on the acceptance of standards set by standard organizations like ISO (International Standards Organization). Banks in general are mainly dependent on IBM products and they rely on IBM to provide for their open needs. The dissertation covers the problems that IBM faces in opening up their systems. Network management protocols are very important. Today there are two main contenders in this area, namely SNMP and CMIP. In the future both protocols might play a role in managing networks. Identification of banks' needs and requirements is important for the definition of the model. Special consideration is given to external factors influencing banks and their networks. To isolate these influences three environments can be identified namely the macro, market and micro environments. The most important requirement of banks is to provide a reliable and continuous service of high standing quality to their clients. Banks provide a variety of financial services to their customers and the competition between different banks makes the development of new, and the improvement of existing services ...
- Full Text:
Data management considerations in the design of Internet of Things applications
- Authors: Sikwela, J. G.
- Date: 2020
- Subjects: Computer networks - Technological innovations , Database management , Computer networks - Management , Network performance (Telecommunication) - Reliability , Big data
- Language: English
- Type: Masters (Thesis)
- Identifier: http://hdl.handle.net/10210/417757 , uj:35393
- Description: M.Ing. (Engineering Management) , Abstract: In the last decade, there has been an increase in the number of IoT devices and applications. It is estimated that by 2020 more than 2 billion devices will be connected to the internet. With the increase in the number of devices, more data will be transferred to the servers. These huge amounts of data will require extraction, processing, and storage for future use. The current data management solutions cannot accommodate the increase in the data generated by these devices. The purpose of this work is to do research on data management considerations in IoT by asking the question of how we can design IoT networks that take into consideration data management and what solutions are available to address this increase in data. The aim of the research is to identify the key principles of data management, investigate techniques that can be used for data management, investigate the best possible frameworks that can be used for data management in IoT, and investigate data storage systems that would be suitable for use in IoT applications. The scope of the research is to study peer-reviewed articles on IoT and data management. This includes studying the different frameworks that exist currently, identifying their limitations and doing an analysis based on IoT design primitives to find a framework that attempts to meet all the desired requirements for an IoT data management framework.
- Full Text:
The management of networks with specific reference to security management
- Authors: Kersten, Karin
- Date: 2012-08-15
- Subjects: Computer networks - Management , Computer networks - Security measures , Computer crimes
- Type: Thesis
- Identifier: uj:9296 , http://hdl.handle.net/10210/5739
- Description: M.Comm. , This dissertation is devoted to an investigation into the network-management environment, with special emphasis on the security aspects and the provision of a reference framework when choosing a network-management product. The dissertation is aimed at those responsible for network-management and the selection of the various network-management products by providing a framework for evaluating network management products. The first four chapters provide the background to the reference framework. The following two chapters are devoted to those aspects to be taken into consideration when evaluating a network-management product. The consolidation and the case study in chapters seven and eight provide an abridged version of the framework and illustrate how the framework could be applied to a network-management product. Chapter one provides the background to the reference framework regarding networks and network-management. The concept of network-management is introduced, as well as the three forms of architectures that could be implemented, namely centralised, hierarchical and distributed architectures. A number of network-management functions have to be taken into consideration when evaluating a network-management package, namely configuration, asset, fault, performance, accounting and security management. These functions are also covered in chapter six. Chapter two provides the background to the security aspect of the reference framework. The three main topics covered in this respect are the definition of network-security, computer crime and specific elements of network-security. This chapter also provides a springboard for the evaluation of the network-management environment, as well as an idea of what issues and measures should be addressed and taken in order to prevent, or at least minimise, the effects of network-security breaches. Chapter three covers issues relating to network-security responsibilities, with special reference to the management side of network-management, including those issues that management should take into consideration when evaluating the network-management environment. Two methods that could be implemented include network-management policies and strategies. Network-security policies and strategies encompass those issues necessary for effective security within an organisation. This chapter, however, covers the more theoretical or higher-level goals or objectives of network-management. Chapter four relates to more of the day-to-day management issues of the network-security and the network-security management services and functions that should be considered. These include issues such as network-security services, managing network access, monitoring and controlling the network security system and the maintenance and modification of the said system. Network-management product considerations are discussed in chapter five, which chapter can be viewed as the business and practical side of the reference framework. The topics discussed here are more closely related to the business considerations when evaluating a networkmanagement package and the practical issues of network-management. Topics discussed in this chapter include security and network-management products, practical approaches to choosing network-management products, critical success factors of network-management and analysis of the cost component. In contrast to these issues, the reference framework expounded in chapter six concentrates on the technical and network-management functions. Chapter six constitutes the culmination of the present dissertation in the form of a reference framework, which is for the greater part formulated along the lines of the criteria given. This reference framework is aimed at those experts enlisted to evaluate and select networkmanagement products, specifically as far as their security-management features are concerned. The areas covered include the user framework, the product framework, networkfault management, network-performance management, network-accounting management, network configuration and change management, network-security management and conformance testing. The topics discussed are, however, by no means exclusive and there are a number of other issues that have not been addressed in this dissertation, but which, depending on the network environment, would have to be taken into consideration. Chapter seven is a consolidation of the reference framework given in chapter six, as well as of some of the main points and criteria that could be considered when performing a quick evaluation of a product. This chapter does not, however, make any pretence to being exhaustive, but merely serves to highlight a few crucial criteria. Chapter eight is devoted to a case study in terms of which the reference framework is applied to a network-management product. In conclusion, a summary of the dissertation is given in chapter nine.
- Full Text: