Sökning: "verification protocol"

Visar resultat 16 - 20 av 48 uppsatser innehållade orden verification protocol.

  1. 16. Mitigation of inter-domain Policy Violations at Internet eXchange Points

    Master-uppsats, KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Författare :Muhammad Raheem; [2019]
    Nyckelord :IXP; Computer Networks; Distributed Systems; SDN; OpenFlow; BGP; Open vSwitch; Security; Firewall; Monitoring; IXP; Datornätverk; Distribuerade System; SDN; OpenFlow; BGP; Open vSwitch; Säkerhet; Brandvägg; Övervakning;

    Sammanfattning : Economic incentives and the need to efficiently deliver Internet have led to the growth of Internet eXchange Points (IXPs), i.e., the interconnection networks through which a multitude of possibly competing network entities connect to each other with the goal of exchanging traffic. LÄS MER

  2. 17. Scheduler Algorithms for MU-MIMO

    Master-uppsats, Lunds universitet/Institutionen för elektro- och informationsteknik

    Författare :Wissam Moustafa; Richard Mugisha; [2017]
    Nyckelord :Scheduling; Beamforming; TDD; TM-8; SRS; Downlink; Round Robin; SU-MIMO; MU-MIMO.; Technology and Engineering;

    Sammanfattning : In multi-user multiple input multiple output (MU-MIMO), the complexity of the base-station scheduler has increased further compared to single-user multiple input multiple output (SU-MIMO). The scheduler must understand if several users can be spatially multiplexed in the same time-frequency resource. LÄS MER

  3. 18. Analysis and Experimental Verification of Diameter Attacks in Long Term Evolution Networks

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Bhanu Teja Kotte; [2016]
    Nyckelord :;

    Sammanfattning : In cellular networks, the roaming interconnection was designed when there were only a few trusted parties and security was not a major concern or design criteria. Most of the roaming interconnections today are still based on the decades-old SS7 and the lack of security is being blamed for several vulnerabilities. LÄS MER

  4. 19. Model checking transaction properties for concurrent real-time transactions in UPPAAL

    Magister-uppsats, Mälardalens högskola/Inbyggda system

    Författare :Jinle Li; [2016]
    Nyckelord :Real-time transaction management; MVCC; model-checking; timeliness; isolation;

    Sammanfattning : As a technique to ensure absence of undesired interference in transactional computations, Concurrency Control (CC) guarantees logical data consistency via providing transaction isolation, thus contributing to their dependability. However, single-version CC, which requires that a transaction system always works on the current version of a data item, may introduce unpredictable delays for real-time transactions because of unbounded blocking time which may cause deadline misses. LÄS MER

  5. 20. Re-configurable hardware programming in a protocol processor unit

    Master-uppsats, KTH/Skolan för informations- och kommunikationsteknik (ICT)

    Författare :Sunil Kallur Ramegowda; [2015]
    Nyckelord :;

    Sammanfattning : Reconfigurable hardware architectures have been a research topic for many years. Programming such architectures requires manual low level coding or the design of custom compilers to generate the required configuration data for the architecture. In general, a protocol processor processes the packets according to the protocol. LÄS MER