Search
Skip to Search Results- 7MacGregor, Mike (Advisor)
- 1Liao, Xiao Yong
- 1Meltzer, Jason
- 1Patel, Ashishkumar
- 1Rogers, Leonard
- 1Sarvepalli, Gowri
- 2Computer networks
- 2Computer security
- 1Buses (computing)
- 1Computer networks, Security measures
- 1Data encryption (Computer science)
- 1Internet domain names
-
2007-09-01
This thesis presents the analysis of 10 Gigabit Ethernet Network Interface Card and simulating & testing of virtual NIC, which is defined as the device in our PCI Multi-Bus Simulator. Network interface processing requires support for the following characteristics: a large volume of frame data,...
-
2007-09-01
PCI Bus is perhaps the most successful Bus design, both on the technical and the marketing levels. From the earliest general PCI Bus to current powerful PCI-E Bus, we can see that PCI Bus has become the most popular Bus system throughout the world. Our project is consisted of three sections:...
-
2021-11-01
Network security is becoming more and more important as people spend more and more time connected. Compromising network security is often much easier than compromising physical or local security, and is much more common. There are a number of good tools to assist with network security. Bringing...
-
Implement Virtual Data Sharing Application on WAN Using DDNS and Its Performance Investigation
Download2021-10-28
In this report I explain the solution of problem faced by the Datagardens Company. They have designed virtual software which is used to move virtual Database server from one network segment to other network segment in a WAN environment. The virtual software is working fine, they are able to move...
-
Implementation Security, or a Language-theoretic Security Analysis of OpenFlow and What I Found There
Download2013-11-01
Implementation is the most immediate aspect of security in the construction of real-world distributed computing systems; designs have flaws but vulnerabilities themselves manifest in implementations. The challenge of securing systems during implementation is apparent from observing the computing...
-
2021-10-28
General Security Concepts, Preface: Systems Administrators, Security Administrators, Network Administrators; whatever title they have, they are tasked with building, maintaining and most importantly, protecting the IT systems from malicious software, intentional intrusions from both internal and...
-
2021-11-03
Virtual environment is an environment in which the old “one server, one application” model is removed and multiple machines are run on each physical machine. Traffic control is the name given to the sets of queueing systems and mechanisms by which packets are received and transmitted on a router....