Essays about: "IP protocol"
Showing result 1 - 5 of 200 essays containing the words IP protocol.
-
1. A Prevention Technique for DDoS Attacks in SDN using Ryu Controller Application
University essay from Blekinge Tekniska Högskola/Institutionen för datavetenskapAbstract : Software Defined Networking (SDN) modernizes network control, offering streamlined management. However, its centralized structure makes it more vulnerable to distributed Denial of Service (DDoS) attacks, posing serious threats to network stability. READ MORE
-
2. Web interface for a multi-purpose transmitter
University essay fromAbstract : The project described in this report aims to construct a web interface for a multi-purpose transmitter (MPT). The MPT is a submodule that is meant to be used in future chromatography systems. This bachelor thesis project is done at Cytiva in Uppsala. READ MORE
-
3. Evaluating Thread network performance, locating and strengthening weak radio links
University essay from Linköpings universitet/Fysik, elektroteknik och matematik; Linköpings universitet/Tekniska fakultetenAbstract : In the fast-developing world we are living in, a tech phenomenon known as the Internet of Things (IoT) has taken hold. It has seen a lot of development over the past few decades, and today there are an estimated 30 billion IoT devices active. IoT is a machine-to-machine network that senses the world with the help of sensors. READ MORE
-
4. Proof of the security of the modified sphinx mixnet header format in the SPORES protocol : A verifiably secure onion routing protocol with indistinguishable replies
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The internet inherently makes secret communication difficult, the entire basis of the IP-protocol is that the routers handling the packets need to know who is receiving the packet. However, there are many reasons why someone would want to communicate in secret. One possible solution is that of onion-routing. READ MORE
-
5. Investigating Machine Learning for verification of AMBA APB protocol.
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : It is a well-known fact that in any Application Specific Integrated Circuit (ASIC) design, verification consumes most time and resources. And when it comes to huge designs, finding bugs can be tedious given the area and the complexity. As per Moore’s law, the design complexity is increasing exponentially due to the growing demand for performance. READ MORE