Essays about: "virtuell router"

Found 2 essays containing the words virtuell router.

  1. 1. Segment Routing Based Traffic Engineering : A QoS adaptive rerouting using segment routing approach based on IPv6 to mitigate network congestion

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Sepehr Javid; [2023]
    Keywords : Segment Routing with IPv6; Quality of Service; Congestion; Extended Berkeley Packet Filter; Segmentering av vägval med IPv6; Tjänstekvalitet; Överbelastning; Utökad Berkeley Packet Filter;

    Abstract : In modern networks, the increasing volume of network traffic and the diverse range of services with varying requirements necessitate the implementation of more advanced routing decisions and traffic engineering. This academic study proposes a QoS adaptive mechanism called "Sepitto", which utilizes Segment routing protocols, specifically SRv6, to address network-traffic control and congestion avoidance. READ MORE

  2. 2. Implementation of data-collection tools using NetFlow for statistical analysis at the ISP level

    University essay from Akademin för innovation, design och teknik

    Author : Daniel Karlström; [2012]
    Keywords : pmacct; statistical analysis; bgp; peer; peering; routing; route; quagga; virtual router; virtual; router; linux; graph; graphing; mrtg; database; mysql; script; scripting; python; bash; libpcap; mdh; data collection; data; collection; collecting; ISP; internet service provider; DoS; DDoS; attack; pmacct; statistisk analys; bgp; peer; peering; peera; routing; route; quagga; virtuell router; virtuell; router; linux; graf; grafa; mrtg; databas; mysql; script; scripting; python; bash; libpcap; mdh; datainsamling; insamling; data; ISP; internetleverantör; DoS; DDoS; attack;

    Abstract : Defending against Dos- and DDoS attacks is difficult to accomplish; finding and filtering out illegitimate traffic from the legitimate flow is near impossible. Taking steps to mitigate or even block the traffic can only be done once the IP addresses of the attackers are known. READ MORE