SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
COMPUTER
NETWORKING
CAPSTONE
PROJECT IDEAS
COMPUTER
NETWORKING
Design a DTM network simulator: this project will seek to deliver a
simulator for testing networks rather than having to use
hardware.
Ascertain the limits of performance for IEEE 802.11 WLANs: how
does theory compare with actual performance?
Reducing convergence time in BGP4 routing: look at techniques
such as Ghost-Flushing in big networks.
WCDMA scheduling algorithms: to improve the performance of
packet date services by controlling allocation amongst users.
Optimization of WDM optical networks: design and development
of networks for improved performance.
Wireless networks and energy efficient routing: a review of
techniques to reduce energy consumption within the network.
Development of a fast network for gaming: how to ensure that
fast servers are utilized for a large group of online players.
Desktop Manager for Networking: Java program to check that all
computers on the network are correctly updated and operating
correctly.
Load manager for the network: balancing multiple servers to act
as one without any single server being overloaded.
Setting up of the private cloud: using an Aneka 2.0 platform for
the implementation of a private cloud for a LAN to be accessed by
multiple users.
COMPUTER
NETWORK
SECURITY
Enhancing security for Ad-Hoc networks: while wireless networks
are quick and easy to set up we need to have more secure
methods of protecting them.
Review of security risks on commercially available cloud networks:
an investigation into the most commonly used services.
Biometric security a review: how easy is it to overcome some of
the methods being suggested for biometric security?
Best strategies for password creation: defining best practice for
passwords that are memorable and secure.
Ethical hacking: is there really such a thing as ethical hacking and
when and where should it be used?
Detection and prevention of website hacking: methods to alert a
website owner of when and how their site has been
compromised.
Theft prevention online: how to prevent the theft of intellectual
property such as text and images from a site.
Best practice for homeworkers: many of those working from home
need to securely attach to work networks, what is the best
practice for doing so?
Are firewalls worth it? Review of firewalls that are commonly used
and how secure they really are.
Secure device synchronization: reliable synchronization of files
between devices and prevention of attacks when doing so.
COMPUTER
NETWORK
RESEARCH
Improving AQM (Active Queue Management): a project to prevent
congestion within satellite networks.
Secure client-server communication in HTTPS: looking at
improving certificate management for PKI implementations.
TCP friendly protocols for mobile streaming: methods of better
sharing available bandwidth.
Development of a wireless system within a warehouse: full control
of the warehouse through a wireless based network.
Personal security alarm: mobile network-based system to alert
nominated people/services of a problem and your current or last
GPS location.
Congestion management of satellite-based systems: management
of data within satellite systems for carrying internet traffic.
Overcoming DNS flooding attacks: systems for preventing this
form of Denial of Service attack on a server.
Mobile payment systems: design of a secure and effective
payment system that can be trusted.
Improving TCP in EGPRS: methods for improving the link between
the internet and your mobile device.
Middleware technology analysis: performance analysis of some of
the most common objects used and recommendations as to the
most effective.
COMPUTER
NETWORK
ANALYSIS
Modelling and optimization of transmission networks: improving
communication through mathematical models.
Header compression Algorithm evaluation: a close look at the
effectiveness of ECRTP in real-time traffic.
MPLS networks and QOS routing efficiency: an evaluation of
different protocols and their effectiveness.
Review or internet architecture to identify resource hungry
systems: how can we better regulate how the resources we have
are utilized.
Review of Intrusion Detection Devices (IDSs): a review of their
effectiveness and possible future developments.
Security of cloud computing security: what systems provide us
with the best levels of security?
Using test data to develop a communication protocol model: a
creation of a test model for communication systems where there
is no correct model available.
Design of routing simulators: a method for reviewing and
analyzing network performance.
P2P search performance improvement with UIM: development of
protocols to speed up the search process.
Review of ICQ security: are there any weaknesses that can be
used by others to change your messaging history?

Contenu connexe

Tendances

Tendances (20)

Network Mnagement for WSN
Network Mnagement for WSNNetwork Mnagement for WSN
Network Mnagement for WSN
 
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERSVTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
VTU 8TH SEM INFORMATION AND NETWORK SECURITY SOLVED PAPERS
 
Building Topology in NS3
Building Topology in NS3Building Topology in NS3
Building Topology in NS3
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Software Define Networking (SDN)
Software Define Networking (SDN)Software Define Networking (SDN)
Software Define Networking (SDN)
 
What is Ethernet
What is EthernetWhat is Ethernet
What is Ethernet
 
Software Defined Network - SDN
Software Defined Network - SDNSoftware Defined Network - SDN
Software Defined Network - SDN
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Chap 12 tcp
Chap 12 tcpChap 12 tcp
Chap 12 tcp
 
Mobile computing unit 1
Mobile computing unit 1Mobile computing unit 1
Mobile computing unit 1
 
Internet stack protocol
Internet stack protocolInternet stack protocol
Internet stack protocol
 
Ieee standards
Ieee standardsIeee standards
Ieee standards
 
MQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message QueueingMQTT - MQ Telemetry Transport for Message Queueing
MQTT - MQ Telemetry Transport for Message Queueing
 
Layer 2 & layer 3 switching
Layer 2 & layer 3 switchingLayer 2 & layer 3 switching
Layer 2 & layer 3 switching
 
Introduction to the Data Link Layer
Introduction to the Data Link LayerIntroduction to the Data Link Layer
Introduction to the Data Link Layer
 
Error correction error detection in digital communication
Error correction error detection in digital communicationError correction error detection in digital communication
Error correction error detection in digital communication
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
SDN Fundamentals - short presentation
SDN Fundamentals -  short presentationSDN Fundamentals -  short presentation
SDN Fundamentals - short presentation
 

Similaire à CAPSTONE PROJECT IDEAS

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
Nico Huysamen
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
Amanda Brady
 

Similaire à CAPSTONE PROJECT IDEAS (20)

Mobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projectsMobile computing-ieee-2014-projects
Mobile computing-ieee-2014-projects
 
Mobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 ProjectsMobile Computing IEEE 2014 Projects
Mobile Computing IEEE 2014 Projects
 
Cloud computing and Software defined networking
Cloud computing and Software defined networkingCloud computing and Software defined networking
Cloud computing and Software defined networking
 
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
LEARNING-BASED ORCHESTRATOR FOR INTELLIGENT SOFTWARE-DEFINED NETWORKING CONTR...
 
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
Learning-based Orchestrator for Intelligent Software-defined Networking Contr...
 
Building Blocks for IoT
Building Blocks for IoTBuilding Blocks for IoT
Building Blocks for IoT
 
Introduction Of Cloud Computing
Introduction Of Cloud ComputingIntroduction Of Cloud Computing
Introduction Of Cloud Computing
 
E2matrix
E2matrixE2matrix
E2matrix
 
Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud Fine grained two-factor access control for cloud
Fine grained two-factor access control for cloud
 
M.E Computer Science Network Security Projects
M.E Computer Science Network Security ProjectsM.E Computer Science Network Security Projects
M.E Computer Science Network Security Projects
 
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Compu...
 
Privacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storagePrivacy preserving public auditing for secured cloud storage
Privacy preserving public auditing for secured cloud storage
 
M.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security ProjectsM.Phil Computer Science Network Security Projects
M.Phil Computer Science Network Security Projects
 
M phil-computer-science-network-security-projects
M phil-computer-science-network-security-projectsM phil-computer-science-network-security-projects
M phil-computer-science-network-security-projects
 
Analysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing ProtocolsAnalysis Of Wireless Sensor Network Routing Protocols
Analysis Of Wireless Sensor Network Routing Protocols
 
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
A CLASS-BASED ADAPTIVE QOS CONTROL SCHEME ADOPTING OPTIMIZATION TECHNIQUE OVE...
 
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
A Class-based Adaptive QoS Control Scheme Adopting Optimization Technique ove...
 
Ieee transactions on 2018 network and service management
Ieee transactions on 2018 network and service managementIeee transactions on 2018 network and service management
Ieee transactions on 2018 network and service management
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
M.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System ProjectsM.E Computer Science Parallel and Distributed System Projects
M.E Computer Science Parallel and Distributed System Projects
 

Dernier

Dernier (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 

CAPSTONE PROJECT IDEAS

  • 2. COMPUTER NETWORKING Design a DTM network simulator: this project will seek to deliver a simulator for testing networks rather than having to use hardware. Ascertain the limits of performance for IEEE 802.11 WLANs: how does theory compare with actual performance? Reducing convergence time in BGP4 routing: look at techniques such as Ghost-Flushing in big networks. WCDMA scheduling algorithms: to improve the performance of packet date services by controlling allocation amongst users. Optimization of WDM optical networks: design and development of networks for improved performance. Wireless networks and energy efficient routing: a review of techniques to reduce energy consumption within the network. Development of a fast network for gaming: how to ensure that fast servers are utilized for a large group of online players. Desktop Manager for Networking: Java program to check that all computers on the network are correctly updated and operating correctly. Load manager for the network: balancing multiple servers to act as one without any single server being overloaded. Setting up of the private cloud: using an Aneka 2.0 platform for the implementation of a private cloud for a LAN to be accessed by multiple users.
  • 3. COMPUTER NETWORK SECURITY Enhancing security for Ad-Hoc networks: while wireless networks are quick and easy to set up we need to have more secure methods of protecting them. Review of security risks on commercially available cloud networks: an investigation into the most commonly used services. Biometric security a review: how easy is it to overcome some of the methods being suggested for biometric security? Best strategies for password creation: defining best practice for passwords that are memorable and secure. Ethical hacking: is there really such a thing as ethical hacking and when and where should it be used? Detection and prevention of website hacking: methods to alert a website owner of when and how their site has been compromised. Theft prevention online: how to prevent the theft of intellectual property such as text and images from a site. Best practice for homeworkers: many of those working from home need to securely attach to work networks, what is the best practice for doing so? Are firewalls worth it? Review of firewalls that are commonly used and how secure they really are. Secure device synchronization: reliable synchronization of files between devices and prevention of attacks when doing so.
  • 4. COMPUTER NETWORK RESEARCH Improving AQM (Active Queue Management): a project to prevent congestion within satellite networks. Secure client-server communication in HTTPS: looking at improving certificate management for PKI implementations. TCP friendly protocols for mobile streaming: methods of better sharing available bandwidth. Development of a wireless system within a warehouse: full control of the warehouse through a wireless based network. Personal security alarm: mobile network-based system to alert nominated people/services of a problem and your current or last GPS location. Congestion management of satellite-based systems: management of data within satellite systems for carrying internet traffic. Overcoming DNS flooding attacks: systems for preventing this form of Denial of Service attack on a server. Mobile payment systems: design of a secure and effective payment system that can be trusted. Improving TCP in EGPRS: methods for improving the link between the internet and your mobile device. Middleware technology analysis: performance analysis of some of the most common objects used and recommendations as to the most effective.
  • 5. COMPUTER NETWORK ANALYSIS Modelling and optimization of transmission networks: improving communication through mathematical models. Header compression Algorithm evaluation: a close look at the effectiveness of ECRTP in real-time traffic. MPLS networks and QOS routing efficiency: an evaluation of different protocols and their effectiveness. Review or internet architecture to identify resource hungry systems: how can we better regulate how the resources we have are utilized. Review of Intrusion Detection Devices (IDSs): a review of their effectiveness and possible future developments. Security of cloud computing security: what systems provide us with the best levels of security? Using test data to develop a communication protocol model: a creation of a test model for communication systems where there is no correct model available. Design of routing simulators: a method for reviewing and analyzing network performance. P2P search performance improvement with UIM: development of protocols to speed up the search process. Review of ICQ security: are there any weaknesses that can be used by others to change your messaging history?