Essays about: "network protocols"

Showing result 26 - 30 of 438 essays containing the words network protocols.

  1. 26. Investigating the Effectiveness of Stealthy Hijacks against Public Route Collectors : Is AS-Path Prepending Enough to Hide from Public Route Collectors?

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Kunyu Wang; [2023]
    Keywords : BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP monitoring; BGP; BGP Hijack; Stealthy IP prefix hijacking; AS-Path Prepending; BGP-övervakning;

    Abstract : BGP hijacking is a threat to network organizations because traditional BGP protocols were not designed with security in mind. Currently, research to combat hijacking is being done by detecting hijacking in real time from Public Route Collectors. READ MORE

  2. 27. Smart Home Protocols : User perception and experiences

    University essay from Linnéuniversitetet/Institutionen för informatik (IK)

    Author : Mattias Lagervall; [2023]
    Keywords : Protocols; Smart Home; Internet of Things; IoT; Devices; User Perception; Thematic Analysis; UTAUT2;

    Abstract : Technology is developing at a rapid pace. With this, Internet of Things (IoT) and smart homes are being used by more and more people every day. The amount of network protocols that is being used in relation to smart homes are many and they come with different features and challenges. READ MORE

  3. 28. A Peer-to-Peer Networking Framework for Scalable Massively Multiplayer Online Game Development in Unity

    University essay from Högskolan i Halmstad/Akademin för informationsteknologi

    Author : Jakob Forsbacka; Gustav Sollenius; [2023]
    Keywords : P2P; Networking; MMOG; Scalability; Multiplayer; Game; NAT Transversal; Unity; Framework; TCP; UDP; RUDP; Transport layer protocols; RPC; Interest Management; Dead Reckoning;

    Abstract : This thesis investigates designing and implementing a peer-to-peer (P2P) networking frameworkfor Unity, a popular game engine, intending to offer a scalable and efficient solution forconstructing networked multiplayer games. The research covers an analysis of a P2P networkarchitecture, transport layer protocols, challenges in NAT traversal, and peer list management. READ MORE

  4. 29. Using Requirement-Driven Symbolic Execution to Test Implementations of the CoAP and EDHOC Network Protocols

    University essay from Uppsala universitet/Datalogi

    Author : Sabor Amini; [2023]
    Keywords : Requirement-driven; Symbolic execution; Network protocols; CoAP; EDHOC; Kravbaserad; Symbolisk Exekvering; Nätverksprotokoll;

    Abstract : As the number of Internet of Things devices is increasing rapidly, it is of utmost significance that the implementations of protocols for constrained devices are bug-free. In general implementations of network protocols are error-prone due to their complex nature and ambiguities in the protocol specification. READ MORE

  5. 30. Designing and Implementing a Web Application for Bluetooth Mesh Device Provisioning and User Management

    University essay from Lunds universitet/Institutionen för reglerteknik

    Author : Patrik Larsson; [2023]
    Keywords : Technology and Engineering;

    Abstract : As technology progresses, it seems to become increasingly inevitable for everyday objects in our homes to incorporate advanced features, to increase functionality, convenience, and energy management. This master’s thesis presents the continuation of a Bluetooth lighting system, aiming to develop a comprehensive website solution for handling the provisioning and configuration of Bluetooth Mesh devices. READ MORE