Browsing by Author "Hash, Larry; Advisor"
Now showing items 1-8 of 8
-
BGP Routing Protocol
Parasa, Sai Kiran; Hash, Larry; Advisor (2016-08)Border Gateway Protocol is the protocol which makes the Internet work. It is used at the Service provider level which is between different Autonomous Systems (AS). An Autonomous System is a single organization which controls ... -
Comparison of Network Switch Architectures by CISCO
Vemula, Veera Venkata Satyanarayana; Hash, Larry; Advisor (2016-02-01)This project is targeted to compare two major switching architectures provided by CISCO. CISCO is a network device manufacturer who has contributed to networking world by inventing many networking protocols which are used ... -
The Deep Space Network - A Technology Case Study and What Improvements to the Deep Space Network are Needed to Support Crewed Missions to Mars?
Falke, Prasad; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer; Climek, David; Reviewer; Kwiat, Kevin; Reviewer (2017-05-28)The purpose of this thesis research is to find out what experts and interested people think about Deep Space Network (DSN) technology for the crewed Mars mission in the future. The research document also addresses possible ... -
Password Habits of Security Literate Individuals
Mahesh, Namrata; Hash, Larry; Advisor; Marsh, John; Reviewer; White, Joshua; Reviewer (2018-05)In the age of the Internet, the common user has accounts on multiple websites. Basic account authentication has a username and a password. While username may be common knowledge, passwords are secret, and it is important ... -
Routing Protocols for MANETs
Muchintala, Priyanka Reddy; Hash, Larry; Advisor (2016-08)This technology case study focuses on the routing protocols used in mobile ad-hoc networks. For any wireless ad-hoc network, routing is the main concept. Proactive and reactive routing protocols are two such approaches. ... -
SECURITY CHALLENGES IN SDN IMPLEMENTATION
Patil, Pradnya; Hash, Larry; Advisor; White, Joshua; Reviewer; Tekeoglu, Ali, Reviewer (2018-05)This study analyzes how security challenges caused by data and control layer separation in the SDN, such as Denial of Service attacks and unauthorized access attacks, limit SDN deployment. This study also offers network ... -
Study of Brain Computer Interfacing (BCI) with Cochlear Implant as an Example
Roy, Debsuta; Hash, Larry; Advisor (2016-08)Brain Computer interfacing (BCI) has been under constant research to improvise the pathway amongst the brain and outside subject in several characteristics. This technology is being widely appreciated as the world tends ... -
A Technology Case Study on Integrating Open Stack with SDN for Internet Connectivity using BGP
Gonuguntla, Raja Bhushan Rao; Hash, Larry; Advisor (2016-12)There were many developments in Internet usage, which resulted in significant increase in Internet routing. With existing networking infrastructure, it is difficult to meet these requirements and causing more cost and less ...