Search
Skip to Search Results- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
2021-10-08
With the rapid increase and demand for advanced services like video conferencing, internet, distance learning, IPTV etc. makes the service providers think that how they can fulfill the requirements of customers. The copper cables, on the other hand, has limited capacity and speed. These...
-
2020-04-05
The usage of cryptocurrencies is gaining momentum with the mainstream economists, and so is the underlying blockchain technology. Blockchain is a distributed digital ledger, where peer-to-peer network validates the transactions using consensus algorithms. More than cryptocurrencies, blockchain...
-
2021-10-04
In this project we have carried out comprehensive research, study and paper modeling to build access network and services for the City of Calgary. The proposed design is based on focusing and offering access solution with many network technologies on both inclusive of Wired and Wireless access....
-
2021-11-05
This project aimed to achieve the goal of providing a cost-effective and easy to deploy architecture design, fulfilling business infrastructure requirements for multi-site and branch headquarter needs. The project considered all positive network performance factors such as redundancy, security,...
-
2010-10-01
Traditionally, a single metric is used to calculate the shortest path to destination in OSPF. Network administrators typically set the OSPF cost metric manually for each connected interface in routers. This way of configuring OSPF in a network can lead to a very uneven traffic flow that can cause...
-
2021-10-08
The solution is addressing the need of implementing DDoS mitigation at the network level without necessarily employing dedicated hardware but rather using the router platforms as efficient mitigation devices for certain clearly defined attack vectors. It also facilitates the off-ramping of the...
-
2021-10-29
The proposed project is mainly based on DDOS (Distributed Denial of services) attack which was performed by hacker group lizard-squad in December 2014 Christmas season. Hacker group were successfully able to perform DDOS attack on XBox, Playstation servers such that gamers were unable to enjoy...
-
2021-10-04
The main objective of this project is to study, analyse and define some of the best practices to prevent zero-day and polymorphic attacks. Zero-day refers to the vulnerability or an attack that has zero days between the time the vulnerability is discovered and the first attack. The operating...
-
2023-04-01
Traditional networking concepts demand a lot of manual operations and high operational cost simultaneously. Therefore, the biggest challenge for large organizations and entities is implementing the complete network manually, along with monitoring and troubleshooting operations. Moreover, as the...