Essays about: "Centralized Network Configuration"

Showing result 1 - 5 of 13 essays containing the words Centralized Network Configuration.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Automating End Station Configuration: An Agile Approach to Time-Sensitive Networking

    University essay from Karlstads universitet/Institutionen för matematik och datavetenskap (from 2013)

    Author : Fredrik Hallström; [2023]
    Keywords : Time-Sensitive Networking; End Stations; Configuration; Centralized Network Configuration; Centralized User Configuration; Engineering Tool;

    Abstract : Industries such as automotive and industrial automation are pushing the limits of networking technology. The Time-Sensitive Networking (TSN) standards offer a promising solution that can meet the demands of high-bandwidth applications with strict timing constraints, allowing time-critical traffic to coexist with other traffic. READ MORE

  3. 3. Development of a C-RAN Fronthaul Simulator

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Noel Tesfalidet; Sam Khosravi; [2023]
    Keywords : 5G; Fronthaul; functional split; C-RAN; simulation; optimization; Digital twin; 5G; Fronthaul; funktionell uppdelning; C-RAN; simulering; optimering; Digital tvilling;

    Abstract : Cellular networks have significantly transformed the way we communicate and access data and the data rates have only been increasing for the last 30 years. 5G is the current generation of cellular networks and enables faster data rates and lower latency. READ MORE

  4. 4. Endpoint Intrusion Detection and Response Agents in Embedded RAN Products : A suitability and performance evaluation

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Yousef Hashem; Elmedin Zildzic; [2022]
    Keywords : intrusion detection; wazuh; security; edr; intrusion response;

    Abstract : Endpoint detection and response is an integral part of the security of large-scale networks. Embedded hardware, such as those found at Ericsson Radio Access Network endpoints, have strict performance requirements that need to be met. READ MORE

  5. 5. Lookaside Load Balancing in a Service Mesh Environment

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Erik Johansson; [2020]
    Keywords : load balancing; lookaside load balancing; external load balancing; service mesh; kubernetes; envoy; grpc; lastbalansering; extern lastbalansering; service mesh; kubernetes; envoy; grpc;

    Abstract : As more online services are migrated from monolithic systems into decoupled distributed micro services, the need for efficient internal load balancing solutions increases. Today, there exists two main approaches for load balancing internal traffic between micro services. READ MORE