Change search
Refine search result
12 51 - 59 of 59
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Rows per page
  • 5
  • 10
  • 20
  • 50
  • 100
  • 250
Sort
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
  • Standard (Relevance)
  • Author A-Ö
  • Author Ö-A
  • Title A-Ö
  • Title Ö-A
  • Publication type A-Ö
  • Publication type Ö-A
  • Issued (Oldest first)
  • Issued (Newest first)
  • Created (Oldest first)
  • Created (Newest first)
  • Last updated (Oldest first)
  • Last updated (Newest first)
  • Disputation date (earliest first)
  • Disputation date (latest first)
Select
The maximal number of hits you can export is 250. When you want to export more records please use the Create feeds function.
  • 51.
    Ugalde, Diego Salas
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Security analysis for MQTT in Internet of Things2018Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Internet of Things, i.e. IoT, has become a very trending topic in researchand has been investigated in recent years. There can be severaldifferent scenarios and implementations where IoT is involved. Eachof them has its requirements. In these type IoT networks new communicationprotocols which are meant to be lightweight are includedsuch as MQTT.In this thesis there are two key aspects which are under study: securityand achieving a lightweight communication. We want to proposea secure and lightweight solution in an IoT scenario using MQTT asthe communication protocol.We perform different experiments with different implementationsover MQTT which we evaluate, compare and analyze.The results obtained help to answer our research questions andshow that the proposed solution fulfills the goals we proposed in thebeginning of this work.

  • 52.
    van 't Hof, David M.
    KTH, School of Information and Communication Technology (ICT).
    Service Provisioning in SDN using a Legacy Network Management System2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Software Defined Networking (SDN) has become increasingly popular in combination with Network Function Virtualization (NFV). SDN is a way to make a network more programmable and dynamic. However, in order to create a homogeneous network using this concept, legacy equipment will have to be substituted by SDN equipment, which is costly. To close the gap between the legacy world and SDN, we introduce the concept of a legacy Network Management System (NMS) that is connected to an SDN controller to perform service provisioning. This way, the NMS is capable of configuring both legacy as well as SDN networks to provide customers with the services that they have ordered, while still allowing for new SDN features in the SDN domain of the network.

    The main service we wish to provide using SDN is Service Function Chaining (SFC). Service provisioning consists of dynamically constructing a path through the ordered network services, in this case Virtual Network Functions (VNFs). This thesis focuses on the SDN controller and its interaction with the NMS. This project aims at configuring OpenFlow rules in the network using an SDN controller to perform SFC. Moreover, the focus will be on how to represent an SDN element and a service function chain in the legacy network NMS. The thesis also contains a discussion on what information should be exchanged between the management software and the controller. The management software used is called BECS, a system developed by Packetfront Software.

    Integrating SDN in BECS is done by creating a proof of concept, containing a full environment from the low level network elements to the NMS. By using a bottom-up approach for creating this proof of concept, the information that BECS is required to send to the SDN controller can be identified before designing and implementing the connection between these two entities. When sending the information, the NMS should be able to receive acknowledgement of successful information exchange or an error.

    However, when the proof of concept was created a problem arose on how to test and troubleshoot it. For this reason, a web Graphical User Interface (GUI) was created. This GUI shows the number of packets that have gone through a VNF. Because it is possible to see how many packets go through a VNF, one can see where a network issue occurs. The subsequent analysis investigates the impact of making such a GUI available for a network administrator and finds that the part of the network where the configuration error occurs can be narrowed down significantly.

  • 53.
    Vasileiadis, Dimitrios
    KTH, School of Electrical Engineering (EES), Electric Power and Energy Systems.
    Implementation of a reference model of a typical IT infrastructure of the office network of a power utility company2017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Power utility companies are really important in our daily routine since theyprovide us with power delivery, which is essential in today's society. Withthe advance of technology, a lot of the procedures that were being manuallydone by these companies to deliver electrical power, have been automated andcentrally controlled by Supervisory Control And Data Acquisition (SCADA)systems. Therefore, this automation must be protected from external attackersthat want to hurt control systems (e.g. SCADA), either by stealing sensitivedata or even by getting control of the control system and changing parametersand functions that are essential for the good and healthy function of thesesystems. Exploiting vulnerabilities in the oce network can bring an adversarya step closer in getting access to the control system. It is not sucient onits own, but the adversary can launch further attacks from there targeting thecontrol system.The aim of this thesis is to construct a reference model of a typical IT infrastructureof the oce network of a power utility company, with a simpliedimplementation in CRATE. CRATE (Cyber Range And Training Environment)is the environment that was used for the implementation of the thesis, providedby the Swedish Defense Research Agency [FOI]. After the implementation isnished, a SCADA system of an enterprise will be installed in CRATE and willbe connected with this oce network. Once this is done, the Swedish DefenseResearch Agency will simulate cyber-attacks in a more complete infrastructure.The point of this thesis is to make the oce infrastructure as close to a real enterprisenetwork, although there with some dierentiation, part of it on purposeand part of it due to some limitations.

  • 54.
    Ververis, Vassilios
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Security Evaluation of Intel's Active Management Technology2010Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Intel’s Active Management Technology (AMT) is, a hardware-based platform for remotely managing and securing personal computers out of band. AMT is available in most desktop and notebooks PCs equipped with an Intel Core 2, Centrino, or Centrino 2 processors with support for vPro technology. AMT operates independently of the platform processor and operating system. Remote platform management applications can access AMT securely, even when the platform is turned off, as long as the platform is connected to power supply and to a network. Developers can build applications that utilize AMT using the application programming interface (API) provided by Intel. While this might seem to enable creation of a powerful management tool, a secure infrastructure that is secure against insider and outsider attacks on an enterprise network is difficult. Unfortunately this technology can also potentially be used to create a powerful backdoor that is easily deployed and offers numerous features due to its almost unlimited permissions since the platform can be managed even though it is powered off.

  • 55.
    Wang, Huajun
    KTH, School of Information and Communication Technology (ICT).
    Interplay between capacity and energy consumption in C-RAN transport network design2016Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Current mobile network architecture is facing a big challenge as the traffic demands have been increasing dramatically these years. Explosive mobile data demands are driving a significant growth in energy consumption in mobile networks, as well as the cost and carbon footprints [1]. In 2010, China Mobile Research Institute proposed Cloud Radio Access Network (C-RAN) [2], which has been regarded as one of the most promising architecture to solve the challenge of operators. In C-RAN, the baseband units (BBU) are decoupled from the remote radio units (RRH) and centralized in one or more locations. The feasibility of combination of implementing the very tight radio coordination schemes and sharing baseband processing and cooling system resources proves to be the two main advantages of C-RAN compared to traditional RAN. More importantly, mobile operators can quickly deploy RRHs to expand and make upgrades to their networks. Therefore, the C-RAN has been advocated by both operators and equipment vendors as a means to achieve the significant performance gains required for 5G [3].

    However, one of the biggest barriers has shown up in the deployment of C-RAN as the novel architecture imposes very high capacity requirement on the transport network between the RRHs and BBUs, which is been called fronthaul network. With the implementation of 5G wireless system using advanced multi-antenna transmission (MIMO), the capacity requirement would go further up, as well as the power consumption. One solution has been proposed to solve the problem is to have the baseband functions divided, partially staying with RRHs and other functions would be centralized in BBU pool. Different splitting solutions has been proposed in [4] [5] and [6].

    In this thesis work, we choose four different splitting solutions to build four CRAN architecture models. Under one specific case scenario with the fixed number of LTE base stations, we calculate the transport capacity requirement for fronthaul and adopt three different fronthaul technology. The power consumption is calculated by adding up the power utilized by RRHs, fronthaul network and baseband processing. By comparing the numerical results, split 1 and 2 shows the best results while split 2 is more practical for dense cell area, since split 1 requires large fronthaul capacity. The fronthaul transport technology can be decided according to different density of base stations. TWDM-PON shows better energy performance as fronthaul network when the capacity requirement is high, compared to EPON. However, for larger number of BSs, mm-Wave fronthaul is a better solution in terms of energy efficiency, fiber saving and flexibility.

  • 56.
    Wellme, Martin
    KTH, School of Electrical Engineering and Computer Science (EECS).
    Architects working agile: Methods and challenges2019Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Enterprise Architecture (EA) is a discipline which is used for describing and designing anorganisation's infrastructure and business processes. Agile methods are known for providingflexibility and adaptability in software development but can be applied to other areas as well.Nowadays, almost all aspects of a business should advance quickly which creates new challengesthat did exist before and the agile way of working is very suitable these situations. This thesis looksinto the challenges employees currently face when working with EA and how agile methods can beused to solve these issues.To investigate this, 19 interviews have been done at an international manufacturer where itsemployees were asked about how they work, which agile practices they use and the challenges theyface. The results of those interviews are presented statistically and compared to the literature reviewas well as two additional interviews done outside of the company in order to find agile methods thatcould be possible solutions to the company's challenges.The interviews showed that the employees already work agile with most of them working iterative,incremental and implementing changes based on feedback from the business which are allprominent agile methods. A few challenges which can be solved through agile were found, one ofthose is better project prioritisation found in Kanban to solve the lack of resources. Another practiceis to have forums, inspired by SAFe ART, between different roles to address the lack ofcoordination and contact between them. The location of the EA office was a challenge which couldbe solved through a non-agile way, by moving it away from the IT department and closer to thebusiness or alternatively move it higher up within the IT organisation.

  • 57.
    Yazdi, Mohammad Hamed
    KTH, School of Electrical Engineering (EES), Communication Networks.
    Software Test Strategies for the RNC RNH Subsystem2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    This work concerns software testing strategies for the Radio Network Controller (RNC) RadioNetwork Handler (RNH) subsystem at the WCDMA development department at Ericsson AB. Due to the rapid development in the area of radio communication It is crucial to constantly develop and deliver new software components without errors in the code, which has to be tested and proved to work on a regular basis. Since development teams are working in parallel, one cannot uphold another team for long periods for testing purposes. It should be easy and straightforward to implement and maintain RNH tests. The main goal is to propose the best way of software testing for the RNH subsystem with respect to the agile way of working.

    In the first part of this work an investigation of the RNH software was done. This was to define a template for code classification. The aim of the classification is to identify a smallest testable unit for different testing levels. The data classes were considered as smallest testable unit for testing on low level. In the second part, unit test was deployed to two different blocks to evaluate unit testing and prove testability of data classes on a low level. In addition, the automated regression test framework was evaluated with respect to node level testing performance. In the third part, unit test was evaluated in comparison to the current testing level at RNH.

    The major result of this investigation shows all testing levels are required for the RNH subsystem, because each level focuses on a specific area of software testing. Furthermore, unit testing is recommended to be a permanent testing level at RNH subsystem, since unit testing is promoted by agile testing strategies (test as early as possible). Besides, when more detailed test on low level (unit testing) is applied, it may lead to the less testing effort on higher level.

  • 58.
    Zandegran Antony Jeyasehar, Ansel
    KTH, School of Information and Communication Technology (ICT), Communication Systems, CoS.
    Multi-operator, Multi-Radio Performance Monitoring and Context-Aware access Provision Test-bed2013Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
  • 59.
    Zheng, Shuang
    KTH, School of Electrical Engineering (EES), Network and Systems engineering.
    Automotive Ethernet Gateway: Network Deployment on Layer 22017Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
    Abstract [en]

    Existing in-vehicle network technologies are becoming bottlenecks because of insufficientbandwidth. Automotive Ethernet is therefore being adopted more and more broadly due toincreased demand for bandwidth-intensive applications, including autonomous driving,navigation and infotainment functionalities. Support of determinism, bandwidth allocationand prioritization of messages, which were not available before, are possible nowadaysthanks to modern switches and the new range of IEEE standards. However, requirementsapplied for heavy vehicles like trucks and buses still require careful network design anddeployment in regard to safety and robustness.In this thesis, we consider future use cases, and evaluate different configuration strategieson layer-2 switches via simulations. We evaluate the effect of the number of traffic classes,and the performance of stream reservation and traffic shaper. The goals are to investigatehow they affect the network and to find the solution which leads to best-balanced Qualityof Service. At the same time, efforts have been made for understanding what features theswitches should include in order to support the configurations. The final outcome ofconfigurations along with features on switches aims at acting as guideline to deployAutomotive Ethernet in the future.

12 51 - 59 of 59
CiteExportLink to result list
Permanent link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf