Essays about: "IP traffic"

Showing result 1 - 5 of 141 essays containing the words IP traffic.

  1. 1. Modeling, Simulation, and Injection of Camera Images/Video to Automotive Embedded ECU : Image Injection Solution for Hardware-in-the-Loop Testing

    University essay from Uppsala universitet/Signaler och system

    Author : Anton Lind; [2023]
    Keywords : ADAS; AD; ADS; HIL; Hardware in the loop; Hardware-in-the-loop; ECU; VCU; Automotive; Embedded; System; Systems; Camera; Image; Video; Injection; FPGA; MPSoC; Vivado; Vitis; VHDL; Volvo; Cars; FMC; HPC; LPC; MIPI CSI2; GMSL2; AMBA AXI4; Xilinx; RTL; Implementation; Synthesis; Intelectual Property; IP; Vehicle computing unit; Electronic control unit; TEB0911; TEF0007; TEF0010; CSI2 Tx; CSI2 Tx Subsystem; Zynq; SerDes; AXI4; AXI4-Lite; Programmable Logic; PL; Processor System; PS; C; C ; Video test pattern generator; VTPG; Axi traffic generator; ATG; Ultrascale ; Virtual input output; VIO; Integrated logic analyzer; ILA; Interface Unit;

    Abstract : Testing, verification and validation of sensors, components and systems is vital in the early-stage development of new cars with computer-in-the-car architecture. This can be done with the help of the existing technique, hardware-in-the-loop (HIL) testing which, in the close loop testing case, consists of four main parts: Real-Time Simulation Platform, Sensor Simulation PC, Interface Unit (IU), and unit under test which is, for instance, a Vehicle Computing Unit (VCU). READ MORE

  2. 2. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE

  3. 3. Cybersecurity Evaluation of an IP Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tova Stroeven; Felix Söderman; [2022]
    Keywords : cybersecurity; IP camera; baby camera; security camera; penetration testing; IoT; Biltema; privacy; ethical hacking;

    Abstract : The prevalence of affordable internet-connected cameras has provided many with new possibilities, including keeping a watchful eye on property and family members from afar. In order to avoid serious breaches of privacy, it is necessary to consider whether these devices are secure. READ MORE

  4. 4. Multibit Trie For The Longest Matching Prefix Problem

    University essay from Umeå universitet/Institutionen för datavetenskap

    Author : Karl Hed Dahlqvist; [2022]
    Keywords : Multibit trie; longest marching prefix problem; CIDR; IP lookup;

    Abstract :  With the ever growing forwarding tables of the internet and the large amount of traffic that flows through them, efficient algorithms to handle search are needed. One of these algorithms is the Multibit trie (prefix tree). READ MORE

  5. 5. Energy efficient Ericsson Many-Core Architecture (EMCA) IP blocks for 5G ASIC

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Zilin Zhang; [2021]
    Keywords : Technology and Engineering;

    Abstract : Power consumption has become a leading concern for SoC aimed at 5G products that demand increased functionality, smaller form factors, and low energy footprint. For some EMCA IP blocks a hierarchical clock gating mechanism ensures coarse-grained power savings based on actual processing need but for many blocks this approach cannot be employed. READ MORE