Advanced search

Showing result 1 - 5 of 8 essays matching the above criteria.

  1. 1. IMPLEMENTING NETCONF AND YANG ON CUSTOM EMBEDDED SYSTEMS

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Krister Georges; Per Jahnstedt; [2023]
    Keywords : NETCONF; MbedTLS; YANG; Embedded; SNMP; XML; HMS; IETF; IIoT; ABCC; Wireshark; TLS; Porting; RTOS; IoT; Interoperability; Networking; Security; Protocols; C C ; Embedded Linux; Configuration Management; Microcontroller; Microprocessor; Scalability; Hardware Interfaces; Hardware; Open source; QA; Data Modeling; System Integration; Automation;

    Abstract : Simple Network Management Protocol (SNMP) has been the traditional approach for configuring and monitoring network devices, but its limitations in security and automation have driven the exploration of alternative solutions. The Network Configuration Protocol (NETCONF) and Yet Another Next Generation (YANG) data modeling language significantly improve security and automation capabilities. READ MORE

  2. 2. Visualizing large page mappings : A tool to understand memory mappings of program

    University essay from Uppsala universitet/Institutionen för informationsteknologi

    Author : Robin Olsson; [2021]
    Keywords : ;

    Abstract : Larger page file sizes were introduced to increase the TLB's reach. Although using large pages might improve performance, it might also introduce performance degradation. READ MORE

  3. 3. Tracing Control with Linux Tracing Toolkit, next generation in a Containerized Environment

    University essay from Luleå tekniska universitet/Institutionen för system- och rymdteknik

    Author : Vikhram Ravi; [2021]
    Keywords : 5g; ran; kubernetes; docker; tracing; observability; troubleshooting; service discovery; lttng;

    Abstract : 5G is becoming reality with companies rolling out the technology around the world. In 5G,the Radio Access Network (RAN) is moving from a monolithic-based architecture into a cloud-based microservice architecture for the purpose of simplifying deployment and manageability,and explore scalability and flexibility. READ MORE

  4. 4. Hardware Root of Trust for Linux Based Edge Gateway

    University essay from Högskolan Kristianstad/Fakulteten för naturvetenskap

    Author : Mohamed Al-Galby; Madani Arezou; [2018]
    Keywords : HRoT; TPM 2.0; Zynq; TSS; RSA; Secure Boot; TPM Simulator;

    Abstract : Linux-based Edge Gateways that connects hundreds or maybe thousands of IoT devices, are exposed to various threats and cyber-attacks from the internet. These attacks form a considerable risk targeting the privacy and confidentiality of IoT devices throughout their gateways. READ MORE

  5. 5. Evaluation of the LSTS Toolchain for Networked Vehicle Systems on KTH Autonomous Maritime Vehicles

    University essay from KTH/Marina system

    Author : Elias Strandell Erstorp; [2015]
    Keywords : ;

    Abstract : The department of Naval Architecture at the Royal Institute of Technology is in posession of one Autonomous Underwater Vehicle (AUV) and a second is under construction. A project for doing hydrographic mapping using an Autonomous Surface Vehicle (ASV) is also initiated. READ MORE