Essays about: "MAC design"
Showing result 1 - 5 of 47 essays containing the words MAC design.
-
1. Analysis of the security of a VXLAN network
University essay from KTH/Hälsoinformatik och logistikAbstract : Traditionally, VLANs have been the most suitable solution for connecting computers. This, in line with the increased use of cloud services in recent years, has given rise to problems with scalability and security within VLAN networks, which need to be investigated. READ MORE
-
2. Evaluation of Ferroelectric Tunnel Junction memristor for in-memory computation in real world use cases
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : Machine learning algorithms are experiencing unprecedented attention, but their inherent computational complexity leads to high energy consumption. However, a paradigm shift in computing methods has the potential to address the issue. READ MORE
-
3. Keeping an Indefinitely Growing Audit Log
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : An audit log enables us to discover malfeasance in a system and to understand a security breach after it has happened. An audit log is meant to preserve information about important events in a system in a non-repudiable manner. Naturally, the audit log is often a target for malicious actors trying to cover the traces of an attack. READ MORE
-
4. Cloud native design of IoT baseband functions : Introduction to cloud native principles
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : The exponential growth of research and deployment of 5G networks has led to an increased interest in massive Machine Type Communications (mMTC), as we are on the quest to connect all devices. This can be attributed to the constant development of long-distance and low-powered Internet-of- Things (IoT) technologies, or, Low Power Wide Area Network (LPWAN) technologies such as Long-Range (LoRa) and Narrow Band- IoT (NB-IoT). READ MORE
-
5. Evaluation of Cryptographic CRC in 65nm CMOS
University essay from KTH/Skolan för informations- och kommunikationsteknik (ICT)Abstract : With the rapid growth of Internet-of-Things (IoT), billions of devices are expected to be interconnected to provide various services appealing to users. Many devices will get an access to valuable information which is likely to increase the number of malicious attacks on these devices in the future. READ MORE