11848_CSE883 Term Paper Topics

Preview:

Citation preview

Term Papers for CSE883

Sr. No Topic Description1,31,61,91,121 User Datagram

ProtocolShow the working of UDP protocol that the data is to be transferred on the basis of routing tables .Show this with the help of flash

2,32,62,92,122 Transmission Control Protocol

Show the working of TCP protocol that first the connection is established than the data is to be transferred. Show this with the help of flash

3,33,63,93,123 Domain Name System

Develop an animation to show that how the name has been changed to ip address and ip address changed to name. Also write the theory along with it.

4,34,64,94,124 Dynamic Host Configuration Protocol

Discuss the use and benefits of a DHCP server. How the configuration is done and IPs allocated. Write down and show the steps using the snapshots. Also discuss the differences with BootP

5,35,65,95,125 File Transfer Protocol Show the working of FTP protocol by creating a scenario of sending an file from one PC to another.show the animation in flash and also write the theroy.

6,36,66,96,126 Wireless LAN Comprehensive study of the Wireless LAN, what all is required to set it up and how does it work. Mention all the equipments used the transmission techniques and other salient features. Set up a dummy network to justify the concepts. Also provide a historic view of the topic. Mention some applications of the same as well. Take snapshots of actual configuration steps to illustrate the steps, use a simulator.

7,37,67,97,127 Firewalls Discuss the various type of software and hardware firewall. Both the Packet filter and Proxy Firewall should be discussed. Demonstrate the use with the help of the Cisco Pix firewall

8,38,68,98,128 IP Show the working of IP using Flash/ create animation – how is it used at the network layer for packing and unpacking packets.

9,39,69,99,129 Unauthorized Access, Man in the middle attacks.

Discuss the ways in which these attacks can occur. How can we minimize of eliminate the causes of attacks. Show the attack at work with the help of examples. CREATE an ANIMATION for the same

10,40,70,100,130 VPN What is the actual technique? Why is it required? How to actually set up the connection? What all protocols are used? Discuss a real time application to Justify the use of VPN , create animation

11,41,71,101,131 IrDA Discuss the in’s and out of the IrDA, where does this technique stand in context to various other techniques, what are the strengths and downsides of using this technique. Do mention the areas where it is used.

12,42,72,102 VLSM Complete study of IP addressing, various classes, Subnetting, Super netting, VLSM. Demonstrate the use purpose with the help of CASE Studies.

13,43,73,103 Binary Maths Game Create a bricks like game for IP addressing 14,44,74,104 Private / Public IP

addressing GameCreate a game where an ip runs into gateway, all public ips should pass and private should be blocked, user input must be taken

15,45,75,105 Unicast, Broadcast, Multicast packet game

Create a game where multiple devices are shown and the system chooses 2 devices, user is asked to identify what kind of communication will take place.

16,46,76,106 VLANs Comprehensive study of the VLANs Infrastructure, what all is required to set it up and how does it work. Why are they required, what benefits do we get out of establishing VLANs. Take a real time example to justify the concept, use of NetSim Simulator is advisable.

17,47,77,107 IP Level Security What is the actual technique? How can we ensure IP Level Security? What all protocols and techniques are used to establish the Security? What are the various fields in which this type of Security is apt.

18,48,78,108 MAC Mac-addresss-table buliding of switch

19,49,79,109 CIDR Discuss the methods used for CIDR, how is it beneficial as compared to other techniques of addressing. Set up a network and put addresses based on CIDR technique to illustrate the concept.

20,50,80,110 Hands free operations of Cell Phones

Comprehensive study of the various devices, protocols and techniques used. Mention some of the areas where these techniques are implemented.

21,51,81,111 WEP & WEP issues Create an animation to show the usage of WEP , illustrate the drawback by creating the animation on - How can it be cracked? One should be able to give real time values and show that it can be cracked.

22,52,82,112 E-mail Clients Discuss the various Email clients that are available in the market and illustrate the concept of IMAP /POP. Set up a Microsoft outlook, outlook express, thunderbird connection on your laptop first with IMAP and the with POP, create a power point of the same.

23,53,83,113 RIP v2 Configure the RIP version 2 by taking an example of your choice. use the snapshot to create a animation in flash that how the packets are being transferred.

24,54,84,114 Switched WANs Discuss the concept of X.25, Frame Relay and ATM in detail. The various devices used should also be labelled and a diagrammatic representation of the working should be presented.

25,55,85,115 Remote Login Discuss the concept of remote login using the Telnet software, write the actual commands used for the purpose of Telnet / Terminal Server and show with the snapshots how connectivity is made, use windows remote connection / team viewer as well and create an animation of the same

26,56,86,116 Ceasar cipher Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book)

27,57,87,117 Network Address Translation

Illustrate the concept of NAT focusing on its purpose and achievement. How does the Address Translation take place and the Transition Table building up process should also be discussed, prepare a game in flash, which shows whether the IP is private or not

28,58,88,118 Mobile IP Address the concept of stationary and mobile hosts along with home and foreign agent. Discuss the problems faced by mobile devices such as Double Crossing and Triangle Routing

29,59,89,119 ARP Discuss the use of ARP, the concept, packet format and various scenarios of the use of the mentioned protocols should be discussed. Create an animation of the same.

30,60,90,120 Show the working of switch

Animations of Switch to be created in flash showing that first time switch broadcast the data packets and then when mac-address-table is build it starts unicasting.

Recommended