Essays about: "IP protocol"

Showing result 1 - 5 of 200 essays containing the words IP protocol.

  1. 1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application

    University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskap

    Author : Yashwanth Venkata Sai Kumar Adabala; Lakshmi Venkata Raghava Sudheer Devanaboina; [2024]
    Keywords : Software Defined Networking; SDN; IP Spoofing; Flooding; DDoS Attacks; Mininet; Snort IDS; Network Security;

    Abstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE

  2. 2. Web interface for a multi-purpose transmitter

    University essay from

    Author : Elin Cederlöf; Maximilian Mattsson; [2023]
    Keywords : Web interface; programming; JavaScript; CSS; HTML; Azure; RTOS;

    Abstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE

  3. 3. Evaluating Thread network performance, locating and strengthening weak radio links

    University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakulteten

    Author : André du Rietz; Elias Salo; [2023]
    Keywords : Internet of Things; IoT; Thread network; Evaluating Thread Network;

    Abstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE

  4. 4. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Benjamin Thellström; [2023]
    Keywords : ;

    Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE

  5. 5. Investigating Machine Learning for verification of AMBA APB protocol.

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Abhiram Srisai Kishore; Mohammed Wasim; [2022]
    Keywords : Machine learning; SOC Verification; AMBA; Neural Networks; Deep Learning; Assertions.; Technology and Engineering;

    Abstract : It is a well-known fact that in any Application Specific Integrated Circuit (ASIC) design, verification consumes most time and resources. And when it comes to huge designs, finding bugs can be tedious given the area and the complexity. As per Moore’s law, the design complexity is increasing exponentially due to the growing demand for performance. READ MORE