Network Configuration Validation1

نویسندگان

  • Sanjai Narain
  • Rajesh Talpade
  • Gary Levin
چکیده

syntax tree exposing the structure of file. This tree is then analyzed by algorithms implemented in Java to create and populate tables in its schema. Often, information in a table is assembled from information scattered in different parts of the file. The system is illustrated in the context of a configuration file containing the following commands in Cisco’s IOS configuration language:

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The effect of supply network configuration on occurring chaotic behavior in the retailer’s inventory

ToToday’s market place is increasingly dynamic and volatile. In this area supply network issues recently have attracted a lot of attention from industrial practitioners and academics worldwide. Chaos theory is the study of complex, nonlinear, dynamic systems. For chaotic systems, a tiny change in conditions may result in an enormous change in system output, whereas substantial changes in condit...

متن کامل

Reliable Designing of Capacitated Logistics Network with Multi Configuration Structure under Disruptions: A Hybrid Heuristic Based Sample Average Approximation Algorithm

We consider the reliable multi configuration capacitated logistics network design problem (RMCLNDP) with system disruptions, concerned with facilities locating, transportation links constructing, and also allocating their limited capacities to the customers in order to satisfy their demands with a minimum expected total cost (including locating costs, link constructing costs, as well as expecte...

متن کامل

Resilient Configuration of Distribution System versus False Data Injection Attacks Against State Estimation

State estimation is used in power systems to estimate grid variables based on meter measurements. Unfortunately, power grids are vulnerable to cyber-attacks. Reducing cyber-attacks against state estimation is necessary to ensure power system safe and reliable operation. False data injection (FDI) is a type of cyber-attack that tampers with measurements. This paper proposes network reconfigurati...

متن کامل

Re-configuration of the Relief Network Considering Uncertain Demand and Link Failure in an Earthquake: A Multi-stage Stochastic Programming

Disasters inevitably trigger far-reaching consequences affecting all living things and the environment.  Therefore, top managers and decision-makers in disaster management seek comprehensive approaches to evaluate facilities and network preparedness in dealing with the response phase of predicted disaster scenarios in terms of number of casualties, costs, and unmet demands.  In this regard, pre...

متن کامل

A Reliability Approach on Redesigning the Warehouses in Supply Chain with Uncertain Parameters via Integrated Monte Carlo Simulation and Tuned Artificial Neural Network

In this paper, a reliability approach on reconfiguration decisions in a supply chain network is studied based on coupling the simulation concepts and artificial neural network. In other words, due to the limited budget for warehouse relocation in a supply chain, the failure probability is assessed for determining the robust decision for future supply chain configuration. Traditional solving ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009