Search
Skip to Search Results- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
2021-10-27
This project is based on MRTG application. Objectives of this project are to Study functions and features of MRTG Application, Implementation and configuration MRTG in the Mint Lab. Setup network scenario in Mint Lab. Monitor network traffic load through MRTG application, Setup Media Server,...
-
2007-11-26
MRTG used for monitoring and measuring the traffic load on network links. It allows the user to see traffic load on a network over time in graphical form. MRTG has been implemented in the MINT lab for experiment purpose and in the live environment of NorQuest College’s network as well. Configured...
-
Multi-Antenna Relay Networks with Joint Transmit-Receive Antenna Selection and Adaptive Modulation
Download2014-01-01
In this project, the adaptive modulation techniques are studied for multi-antenna amplify-and-forward relay networks with optimal transmit-receive pair selection. Multiple-antenna technology and relay networks are being studied for fourth and subsequent wireless communication standards....
-
2021-01-01
Multi-Factor Authentication is an authentication system that verifies the user’s identity based on multiple factors of authentication, such as ‘something you know’, ‘something you have’ and ‘something you are’. It provides better security as compared to an authentication system that employs only...
-
2015-04-28
Impetuous development of Internet and IP technologies lead to increasing number of users and burst number of the traffic flows, needed to services demands of these users. Although ISP every few years upgrade their networks with new interfaces: 1G to 10G, 10G to 100G, 400G is near, the exponential...
-
2007-09-01
In modern computer system, the CPU and memory communicate by fast system bus; for example, the network cards (NICs) use DMA transfers over the PCI bus to place incoming data in buffers and in main memory or to transmit data from buffers in the main memory. The Peripheral Component Interconnect,...
-
2021-11-05
Network functions virtualization disaggregates the network functions from the network hardware. As a result, functions, such as NAT, firewalling, IPS and DNS etc. can be delivered in software and deployed on the commodity hardware instead of specialized network hardware. This gives enterprises...
-
2008-04-01
Objective: This project aims to test and optimize the performance of the YottaYotta distributed storage system over two geographically separated sites. The setup for the actual tests will consist of two sites with two YottaYotta systems in each site. It is envisioned that the two sites are...
-
2021-10-04
Intrusion prevention has become an extremely important feature of the Defense-in-Depth strategy. The intention of this project is to build the Linux-based open source system which functions as an IPS based on a merger/rewrite of Wireshark and Snort with IP Geolocation built in. This system should...
-
2023-04-01
In the modern world, communication has become essential in everyone’s daily life, but some remote communities still need the internet and other essential communication services. Due to no contact with the outer world, remote communities are at a socio-economic disadvantage with no access to the...