Search
Skip to Search Results- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
2015-04-18
Multi-Protocol Label Switching (MPLS) is growing in popularity as a set of protocols for provisioning and managing core networks.[6] Multi-protocol label switching integrates label-swapping framework with network layer routing that allows flexibility in the delivery of new routing services, since...
-
2021-10-01
QoS (quality of service) as its name, it utilizes basic networking technologies such as classifying, queuing, policing, packet drop, and shaping to maintain the certain network quality based on SLA (Service-Level Agreement), and also supply better service and performance for networking...
-
2021-11-04
Security of IPv4 packets is of great importance as it carries user’s important data in the payload. There are different technologies like VPN, SSL that uses different security mechanisms to protect user’s data from being accessed by the attackers. However, with the advancement in technologies...
-
2014-08-01
To meet the demands of ever increasing wireless traffic, relay networks has been identified as a promising solution. However, they are prone to co-channel interference which arises due to the aggressive reuse of the available spectrum. Therefore, this project investigates the effect of...
-
2008-04-01
Nowadays storage area networks (SAN) have become an important part of small and large enterprises, where the need of a reliable and flexible architecture for storage across different location arises. Having said this, the selection of the very basic components where the storage solution will be...
-
2023-04-01
Cloud gaming allows gamers to enjoy high-quality gaming experiences at any time and from any location. Complex game software is hosted on powerful servers in data centres, rendered game scenes are broadcast to players in real time over the Internet, and players interact with the games using...
-
2023-04-01
The security of surgical robotics systems needs to be ensured given the growing usage of technology in healthcare. Cybersecurity risks can potentially compromise the surgical robotics systems' availability, confidentiality, and integrity, with severe repercussions for patients and medical...
-
Research Implementation and Analysis of Security Issues in 5G Network Slicing using SDN and NFV
Download2021-10-06
The revolutionary part of 5G architecture makes it different from the previous generations of telecommunication, by providing the services such as enhanced mobile broadband (eMBB), ultra-reliable and low latency communications (URLCC), and massive machine type communications (mMTC). The...
-
2023-04-01
Network slicing is a key enabling technology of 5G deployment. With this technology, MNOs could flexibly and logically dedicate some of their core network resources to various businesses and enterprises and provide a specific quality of service and policies based on agreed terms. This ability...
-
2023-04-01
The Blockchain is the decentralized and distributed chain of blocks that contains information, which was designed to timestamp the digital data so that it cannot be tampered. Since its inception in 2008 by Satoshi Nakamoto, Blockchain technology has drawn the attention of several financial and...