Search

Skip to Search Results
  • 2022-03-26

    Sumitra, Soumy

    Cyber security is an application of technologies that provides secured networks, protects data from unauthorized access, and makes resources available only to authorized personnel [1]. In today’s world, data is the new oil. The Internet plays a crucial role in data exchange, not just limited to...

  • 2022-03-31

    Dhayanidhi, Glory

    Internet of Things (IoT) has become one of the progressive innovations and inviting space of interest for the research world and financially captivating for the business world. Integrating different devices and associating devices with humans requires artificial intelligence/ machine learning...

  • 2022-03-24

    Lyu, Jianhui

    Traditional enterprise networking requires lots of manual operation, such as manual troubleshooting, configuration, monitoring and analysis. Especially for large enterprises, which might have hundreds or even thousands of sites, the labor cost of manual operation is exceptionally high, and the...

  • 2022-03-31

    Kharub, Jatin

    In the world of ever-growing business, it is expected that WANs will provide even better functionalities in the future. WANs have their connection, security, and network information programmed directly into the device. But with a strategy of providing a software overlay for connection...

  • 2022-04-03

    Midudula, Rashi

    Abstract: In recent years, the number of IoT devices has increased exponentially, evolving in virtually every domain, making businesses smarter and more efficient. This project will oversee various applications and use cases of IoT in enterprises and its evolution by aspects of Artificial...

  • 2021-02-28

    Hussain, Syed Ahmed

    The objective of this project is to study Local and Hybrid Cloud computing models and benchmark which of the cloud providers (or vendors) provide top-of-the-class services when comparing their components and services. The project will focus mainly on Scalability, Latency, Security, Distributed...

  • 2021-09-29

    Brar, Dharamjeet

    Increasing number of users and data hungry applications in networks today demand more network throughput than they did years ago. Global IP Internet traffic increased 34% from 10,942 Petabyte per month in 2009 to 47,176 Petabyte per month in 2014, (Cisco Systems, 2010, p. 7). While network speeds...

  • 2021-11-03

    Singh, Gaganpreet

    A smart grid is the modernization of power grid for automation of energy, where transmission, distribution, power generation, utilization, and management are fully upgraded to ultra-high speed and low latency cellular network to improve efficiency, agility, eco-friendly, economy, security, and...

  • 2021-10-01

    Bassi, Harsh

    Enterprise CORD is one of the CORD use cases which provide enterprise connectivity services in wide area networks and over metro services, with the help of open source software and inbuilt commodity hardware. It is an extension of the CORD which is the combination of NFV, SDN and the cloud and it...

  • 2021-11-04

    Tariq, Syed Najm us Saqib

    Today almost every service provider use Multi-Protocol Label Switching (MPLS) on its core network, because it is one of the technologies that are easily scalable, with more flexibility to work with existing technologies and better compatibility for service providers carrying traffic with QoS and...

1 - 10 of 35