Essays about: "Packet utilization"

Showing result 11 - 15 of 48 essays containing the words Packet utilization.

  1. 11. Link Criticality Characterization for Network Optimization : An approach to reduce packet loss rate in packet-switched networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Farhad Zareafifi; [2019]
    Keywords : Network Optimization; Traffic Engineering; Link Criticality; QoS.; Nätverksoptimering; trafikdesign; länkkritikalitet; QoS.;

    Abstract : Network technologies are continuously advancing and attracting ever-growing interests from the industry and society. Network users expect better experience and performance every day. Consequently, network operators need to improve the quality of their services. READ MORE

  2. 12. Virtualization of Data Centers : Case Study on Server Virtualizationn

    University essay from Blekinge Tekniska Högskola

    Author : Sri Kasyap Kappagantula; [2018]
    Keywords : Internet; Servers; System Performance; Throughput; Virtualization;

    Abstract : Nowadays, Data Centers use Virtualization, as a technique to make use of the opportunity for extension of independent virtual resources from the available physical hardware. Virtualization technique is implemented in the Data Centers to maximize the utilization of physical hardware (which significantly reduces the energy consumption and operating costs) without affecting the “Quality of Service (QoS)”. READ MORE

  3. 13. Implementation and Benchmarking of a Crypto Processor for a NB-IoT SoC Platform

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Sébastien Fuhrmann; Luis Cavo; [2018]
    Keywords : 3GPP; IoT; HLS; security; cryptography; AES; SNOW; ZUC; hardware; ASIC; confidentiality; integrity; cipher; Technology and Engineering;

    Abstract : The goal of this Master’s Thesis is to investigate the implementation of cryptographic algorithms for IoT and how these encryption systems can be integrated in a NarrowBand IoT platform. Following 3rd Generation Partnership Project (3GPP) specifications, the Evolved Packet System (EPS) Encryption Algorithms (EEA) and EPS Integrity Algorithms (EIA) have been implemented and tested. READ MORE

  4. 14. Next Generation SDN Switches Using Programming Protocol-Independent Packet Processors

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Tijo Varghese Thazhone; [2018]
    Keywords : ;

    Abstract : Over recent years, Software Defined Networking has enabled operators to control the network and realize new networking topologies. With increasing network traffic and protocol formats that aim at managing the traffic efficiently, the capabilities offered by Software Defined Networking alone are currently limited by the underlying fixed hardware infrastructure. READ MORE

  5. 15. Assessment of Snort Intrusion Prevention System in Virtual Environment Against DoS and DDoS Attacks : An empirical evaluation between source mode and destination mode

    University essay from Blekinge Tekniska Högskola/Institutionen för datalogi och datorsystemteknik

    Author : Avinash Kiran Ivvala; [2017]
    Keywords : Intrusion Prevention Systems; cloud computing; snort; source mode; destination mode.;

    Abstract : Context. Cloud computing (CC) is developed as a Human-centered computing model to facilitate its users to access resources anywhere on the globe. The resources can be shared among any cloud user which mainly questions the security in cloud computing. READ MORE