Essays about: "Packet utilization"
Showing result 11 - 15 of 48 essays containing the words Packet utilization.
-
11. Link Criticality Characterization for Network Optimization : An approach to reduce packet loss rate in packet-switched networks
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Network technologies are continuously advancing and attracting ever-growing interests from the industry and society. Network users expect better experience and performance every day. Consequently, network operators need to improve the quality of their services. READ MORE
-
12. Virtualization of Data Centers : Case Study on Server Virtualizationn
University essay from Blekinge Tekniska HögskolaAbstract : Nowadays, Data Centers use Virtualization, as a technique to make use of the opportunity for extension of independent virtual resources from the available physical hardware. Virtualization technique is implemented in the Data Centers to maximize the utilization of physical hardware (which significantly reduces the energy consumption and operating costs) without affecting the “Quality of Service (QoS)”. READ MORE
-
13. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform
University essay from Lunds universitet/Institutionen för elektro- och informationsteknikAbstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE
-
14. Next Generation SDN Switches Using Programming Protocol-Independent Packet Processors
University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)Abstract : Over recent years, Software Defined Networking has enabled operators to control the network and realize new networking topologies. With increasing network traffic and protocol formats that aim at managing the traffic efficiently, the capabilities offered by Software Defined Networking alone are currently limited by the underlying fixed hardware infrastructure. READ MORE
-
15. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode
University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknikAbstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE