Essays about: "Access network"

Showing result 16 - 20 of 933 essays containing the words Access network.

  1. 16. Informal Knowledge Sharing : Grasping the Complexity of Sharing Knowledge in Ericsson’s Software Development

    University essay from Linköpings universitet/Projekt, innovationer och entreprenörskap

    Author : Arvid Wittwång; Amanda Perlind; [2023]
    Keywords : Knowledge; Knowledge Management; Knowledge Sharing; Informal Knowledge Sharing; Knowledge Sharing Culture; Information; Electronic Knowledge Network; Digital Tools; Software Development; Product Development; Ericsson; Cloud RAN; 5G; Case Study; Multi-Grounded Theory; Grounded Theory;

    Abstract : Many organizations have realized the importance of managing what they know in a proper way, with the sharing of knowledge as one of the most central aspects. However, the practices of knowledge sharing are seldom fully understood, and thus implementations of technical systems intended to improve knowledge sharing have less effect than expected. READ MORE

  2. 17. Designing and evaluating distribution networks for luxury beds : A case study of Hästens Beds’ European distribution from the perspective of cost and delivery service

    University essay from Linköpings universitet/Logistik- och kvalitetsutveckling

    Author : Sebastian Huss; Arvid Normann; [2023]
    Keywords : distribution; distribution network design; transport minimization; network structure; network optimization; decentralization; facility location; center of gravity;

    Abstract : Hästens Beds is a Swedish luxury bed manufacturer, located in Köping, Sweden. They have a strong global presence, with Europe being the most mature and proven market. READ MORE

  3. 18. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  4. 19. Man in The Middle Attacks on Software Defined Network

    University essay from Mälardalens universitet/Akademin för innovation, design och teknik

    Author : Eskil Christensson; [2023]
    Keywords : ;

    Abstract : Software Defined Networking (SDN) is a method of abstracting the network to ease administration by centralizing it. Doing this removes intelligence from the devices and this might open up local security vulnerabilities. READ MORE

  5. 20. Machine Learning Clustering andClassification of Network DeploymentScenarios in a Telecom Networksetting

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Chayan Shrang Raj; [2023]
    Keywords : Telecommunications; Statistics; Machine Learning; Masters; PySpark; Python; Data Visualization; LTE; eNodeB; Data analysis; Data Science; AI; Jupyter; HDFS;

    Abstract : Cellular network deployment scenarios refer to how cellular networks are implementedand deployed by network operators to provide wireless connectivity to end users.These scenarios can vary based on capacity requirements, type of geographical area, populationdensity, and specific use cases. READ MORE