Essays about: "802."

Showing result 1 - 5 of 280 essays containing the word 802..

  1. 1. Minimizing the clock drift in partially synchronized heterogeneous TSN networks

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Balqis Yusuf; [2023]
    Keywords : ;

    Abstract : The new generation of embedded systems will increase interaction between the environment, people, and autonomous devices. This will increase their need for communication, particularly in meeting real-time requirements. READ MORE

  2. 2. “Human Spiders”: Intellectual Observers, Degeneration and Darwinism in H.G. Wells’ The Time Machine

    University essay from Lunds universitet/Avdelningen för engelska

    Author : Maja Loberg; [2023]
    Keywords : Degeneration; Fin de Siècle; Literature; Darwinism; H.G. Wells; The Time Machine; Intellectual Observer; Victorian literature; Languages and Literatures;

    Abstract : H.G. Wells’ novella The Time Machine (1895) tells the story of The Time Traveller who travels to the year 802,701. There, he encounters two evolutionary progressions of humanity. READ MORE

  3. 3. Pentesting on a WiFi Adapter : Afirmware and driver security analysis of a WiFi Adapter, with a subset of WiFi pentesting

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Johan Henning; [2023]
    Keywords : Firmware; Drivers; WiFi; Ethical Hacking; Penetration Testing.; Firmware; Drivrutiner; WiFi; Etisk Hackning; Penetration Testing.;

    Abstract : Simple IoT devices such as WiFi adapters have the possibility of containing vulnerabilities because of the vast complexity of parsing and implementing the IEEE 802.11 standard correctly. READ MORE

  4. 4. Penetration testing of a smart speaker

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Amin Nouiser; [2023]
    Keywords : Penetration testing; Ethical hacking; Smart speaker; Cybersecurity; Internet of Things; Penetrationstestning; Etisk hackning; Smart högtalare; Cybersäkerhet; Sakernas Internet;

    Abstract : Smart speakers are becoming increasingly ubiquitous. Previous research has studied the security of these devices; however, only some studies have employed a penetration testing methodology. Moreover, most studies have only investigated models by well-known brands such as the Amazon or Google. READ MORE

  5. 5. TSN Distributed Clock : An analysis of relationships between network configuration parameters and the resulting precision of time synchronization

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Jakob Götberg; Jakob Olsson; [2023]
    Keywords : Time Sensitive Networking TSN ; IEEE 802.1AS; Ethernet; Time Aware Shaper TAS ; Real-time Communication; Time Sensitive Networking TSN ; IEEE 802.1AS; Ethernet; Time Aware Shaper TAS ; Realtids kommunikation;

    Abstract : In real-time systems spanning a network, there is a need for deterministic communication. The best-effort approach which most of the Internets traffic follows is not suitable for this area since it does not guarantee packet delivery within a deadline and there is also no accurate measure of when the packet was sent. READ MORE