Essays about: "network time protocol"

Showing result 1 - 5 of 324 essays containing the words network time protocol.

  1. 1. Control system and simplified timesynchronization for heterogenous IoT systems with medium time requirements

    University essay from KTH/Hälsoinformatik och logistik

    Author : Jemma Touma; Simon Hejdenberg; [2024]
    Keywords : Internet of Things; time synchronization; wireless sensor networks; network time protocol; Android; Bluetooth; WiFi Direct;

    Abstract : The company QTPIE conducts research on drivers and their unconscious reactions when driving. To help, they use smart devices that today must be individually handled at the start and end of a run, and have individually set timestamps, which can lead to differences between the units when data is entered and collation of the units' data after a run. READ MORE

  2. 2. Development and Implementation Strategies Towards a Comprehensive YANG Model-Based Configuration Data Generation Tool

    University essay from KTH/Hälsoinformatik och logistik

    Author : Alma Garpenfeldt; Linus Silfver Shahparastan; [2023]
    Keywords : YANG modeling language; Configuration management; Network management; Template-based configuration; NETCONF protocol; YANG-modelleringsspråk; Konfigurationshantering; Nätverkshantering; Mall-baserad konfiguration; NETCONF-protokoll;

    Abstract : Effective management and operation of modern networks heavily rely on efficient network configuration management and infrastructure. Manual configuration management has been proven inefficient, and there is a need to automatize it. READ MORE

  3. 3. Near-Real Time Forest Fire Monitoring System From an UAV

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : August Näsman; Daniel Nedlich; [2023]
    Keywords : ;

    Abstract : The purpose of this thesis is to implement a payload system on a drone to help fire towers in near-realtime survey forests for wildfires. The payload system should be able to communicate with a groundstation through a mobile network and the survey should be tagged with relevant metadata. READ MORE

  4. 4. Ethical Hacking of a Smart IoT Camera : A Penetration Test on D-Link DCS 8515-LH Smart Camera

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Chunyu Zhuang; [2023]
    Keywords : Cybersecurity; IoT security; IoT camera; IoT devices; Penetration testing; Ethical hacking; Threat modeling; Cybersäkerhet; IoT säkerhet; IoT Kamera; Penetrationstestning; Etisk hacking; Hotmodellering;

    Abstract : The trending usage of IoT devices raises serious security concerns. IoT devices have complete access to users’ network environments. In the eyes of hackers, the value of IoT devices is exceptionally high. From minor disturbances to major crimes, all could happen in no time with compromised IoT devices. READ MORE

  5. 5. Evaluating the use of clock frequency ratio estimators in the playout from video distribution networks

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Emil Myresten; [2023]
    Keywords : Clock Frequency Ratio Estimator; Real-time Transport Protocol; RTP; Video Distribution Network; Playout Scheduling; Clock Skew; Clock Synchronization; Uppskattning av klockfrekvensratio; Real-time Transport Protocol; RTP; Distributionsnätverk för video; Utspelningsschemaläggare; Klockskevning; Klocksynkronisering;

    Abstract : As traditional TV-broadcasters utilize the Internet to transport video streams, they often employ third party distribution networks to ensure that the Quality of Service of the packet stream remain high. In the last step of such a distribution network, a playout scheduler will schedule the packets so that their intervals are as close as possible to the intervals with which they were initially sent by the source. READ MORE