Search
Skip to Search Results- 32MacGregor, Mike (Supervisor)
- 2Mir, Shahnawaz (Supervisor)
- 1Afzal, Muhammad Idrees
- 1Baweja, Amardeep Singh
- 1Bhansali, Ritika
- 1Bhat, Shriya
- 4Internet telephony
- 3Quality of service (Computer networks)
- 3Routing protocols (Computer network protocols)
- 3Voice over IP networks
- 2Long-Term Evolution (Telecommunications)
- 2Routers (Computer networks)
-
2022-02-28
Cybersecurity is the process or state of protecting programs, networks, and systems from any cyber-attack. These cyber-attacks are usually aimed at changing, accessing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. In an enterprise,...
-
2022-05-16
This capstone project will navigate around the problem of the Digital Divide and its associated solution in Canada’s Northern communities and explore potential solutions to minimize the Digital Divide. The term Digital Divide refers to the lack of opportunities to access Information and...
-
2021-10-27
This project is based on MRTG application. Objectives of this project are to Study functions and features of MRTG Application, Implementation and configuration MRTG in the Mint Lab. Setup network scenario in Mint Lab. Monitor network traffic load through MRTG application, Setup Media Server,...
-
2021-10-21
The Telecom sector is subject to a strict set of standards with regards to the performance and availability of its systems. It has therefore primarily been a domain of proprietary and standardized software and hardware. Traditionally telecom companies have resisted change. With data overtaking...
-
2021-10-27
The excursion of IT infrastructure development throughout the last 60 years has been quite lengthy and complicated with the steady pace of progress at each spending days. Today cloud computing is driving the next wave of change in the world of infrastructure. Cloud computing is the third...
-
2020-09-01
In this technological world, data leakage poses a severe threat to every organization as well as to individuals. Every day, a new data leak or a data breach is happening, and the number of data leaks is increasing continuously, resulting in the rise in the cost of handling a data leak. Whether...
-
2015-01-22
Long-term evolution (LTE) networks are expanding worldwide due to their capability to provide high data rates to fulfill the growing data needs of mobile subscribers. RF spectrum is limited but its underutilization means that more subscribers can be accommodated in the LTE network. The technology...
-
2014-07-01
Long Term Evolution (LTE) is the fourth generation of telecommunication technology standardized by 3GPP. It is developed to have high speed data support with low latency, higher data rates and maximum spectral efficiency. This is done by utilizing latest radio access technologies which include...
-
2014-04-01
Long term Evolution is the recent telecommunication technology proposed by 3GPP. It is boasts to have low latency, high data rates and higher spectral efficiency which occurs by having Packet switched architecture for both voice and data. For this altered architecture, testing LTE in real network...