All Project Reports must be submitted to the
instructor no later than Sunday,
Nov 22, 2015 (23:59:59) (1 second before midnight). All Essay submissions must be sent by email
as attached files to Dr. Kent at rkent@uwindsor.ca.
All Project Reports must have:
·
Title page with project Title, course number
(60-367-01), date and Student Name and Student ID number.
·
Introduction – explain the topic briefly, its history
and similar “light stuff”, where (or how) is it used
·
In Depth – explain the technology in more detail, how
does it work, what problems does it solve, who is responsible for it (creation,
maintenance, approval, etc) and so on
·
Research and Development – where is the technology
going, what are the problems being researched, is a new version emerging, and so
on
·
Conclusion – very brief
·
References – a complete list of all references used,
including research articles, websites, textbooks, trade magazines and so on
References MUST actually be used in a relevant manner
in your Report. When you state something
that you do not fully understand, or that you do not prove or provide evidence
of directly, you must reference those points or assertions. Most textbooks and research articles show how
proper referencing is done in essays and reports. Under no circumstances may quoted materials
appear without being enclosed within quotation marks, and appropriately
referenced.
Below are listed several Topic areas. Each topic is broken down into subtopics – ONE of these subtopics must be covered by
exactly ONE student. Due
to the number of subtopics versus students in the class, it is likely that some
topics may be chosen by more than one student.
Each student must do their own work, but students are encouraged to form
discussion groups. The purpose of such
groups is to improve the opportunities for each student to demonstrate and test
their knowledge and to gain better perspectives on what constitutes good work
versus inadequate or incomplete work.
In cases where students may wish to
undertake a topic not listed, they are required to advise the Instructor before
proceeding in order to receive approval.
Non-approved topics will receive a mark of 0.
Topic/Subtopic
Quick Links:
·
Topic
#1. Network Security: Concepts
·
Topic
#2. Network Security: Practice
·
Topic
#3. Network Security: Threats
·
Topic
#4. Advanced Wireless Networking: Wireless LANs
·
Topic
#5. Advanced Wireless Networking: Wireless WANs and Security Issues
·
Topic
#6. Network Administration and
Diagnostics
·
Topic
#7. Network Applications: 1
·
Topic
#8. Network Applications: 2
·
Topic
#9. Broadband and Other ISP-Related
Issues
·
Topic #11. Global Positioning System
·
Topic #12. Other topics by suggestion
NOTE: Topics already allocated to students will be
crossed out. Students should submit a
list of several topics in ranked order (most wanted to least wanted).
Subtopics:
1. Public/Private key
encryption
2. SSL/TLS
3. Kerberos,
authentication and key distribution
4. Certificates and certificate authorities
(e.g. VeriSign, Thawte)
5. Digital Signatures
Subtopics:
1. Hardware and software
firewalls
2. Virtual private
network security
3. IPSec
4. Intrusion Detection
Systems
5. PGP
Subtopics:
1. Denial of Service
attacks, avoidance and prevention
2. Trojan Horses, Worms
and Viruses
3. Spoofing, Replay,
Snooping/Sniffing attacks
4. SQL
injection attacks
5. Botnets
Subtopics:
1. 802.11a
2. 802.11b/g (Note: both
b and g are included)
3. 802.11 e, including
quality of service
Subtopics:
1. 802.16 (broadband wireless)
2. WEP (including its
weaknesses) and WPA
3. Similarities and
differences between wireless WANs and mobile phone networks
Subtopics:
1. Using ping and
traceroute and other tools to test connectivity/routing
2. PC network
configuration (Address, subnet masks, DNS, etc., using either Windows or Linux
as the OS – your choice)
3. Querying and updating
a routing table by hand, using the ‘route’ command
4. Tools: Ethereal
and other frame sniffers (Data Link layer)
5. Tools: TCPDump and other datagram sniffers (Network layer)
6. Tools: Kismet
and other wireless network sniffers
7. Tools: ARPwatch and other ARP packet sniffers
Subtopics:
1. HTTP/WWW (how it works, in
detail)
2. FTP (how
it works, in detail)
3. NFS (how
it works, in detail)
4. Instant messenging (how it works, in detail)
5. E-Mail sending and
receiving (how they work, in detail)
Subtopics:
1. File sharing (e.g. BitTorrent, Gnutella, LimeWire)
2. Active Directory
3. Telnet/SSH
4. Terminal Services,
and similar programs
5. Voice over IP
software
6. Video conferencing
software
Subtopics:
1. Cable internet
(roughly how it works)
2. ADSL (roughly how it
works)
3. Broadband wireless
4. Modems (roughly how
they work)
5. ISDN, T1/T3, and
other fixed/leased links
6. Business service with
cable/DSL vs. residential service
7. Broadband via
satellite
Subtopics:
1. Types of network
games (e.g. first person shooters vs. web games), and performance issues
related to online gaming
2. LAN Gaming versus
Internet Gaming (e.g. performance, types of games)
Subtopics:
1. Conceptual overview
& how it works
2. Triangulation and the
effect of additional satellites
3. Different hardware
GPS setups and systems (e.g. commercial)
4. Vehicular
communication systems
Subtopics:
1. Students may elect to
suggest a specific topic to Dr. Kent. In
all cases, the student must present the topic for approval by Dr. Kent before
proceeding to do the work. Non-approved
topics will receive a grade of zero (0).
Each group and individual project
submission and presentation will be evaluated based on the following criteria:
·
Group report (Weight: 100% of Project grade)
o
Length: Variable, but most likely between 6-10
pages for each student. It is almost
certain that a report of 4 pages (title, references plus 2 pages) is too
trivial and would receive a poor grade
o
Clarity - is it
understandable, does it use appropriate language; has a spell checker and basic
grammar check been done; are sentences grammatically complete
o
Organization – spend time organizing your material in
order to create a report that is logically structured and makes sense
o
Completeness (PRIMARY IMPORTANCE)
§
does it define the issues completely and adequately
§
is the report effective or does it leave unanswered
questions, terms, explanations
§
is the report focused on the topic
o
Definitions and explanations (PRIMARY IMPORTANCE) –
pay particular attention to well-satisfying each of the following
considerations
§
Terminology
§
Purpose
§
Theory
§
Application
§
Technology
o
Quality and Adequacy of background research to support
the submitted work product
o
References – complete and adequate references, proper
referencing styles within the report, proper use of quotations
NOTES:
The evaluation of the Project
work is necessarily subjective, although the criteria stated above will form
the objective basis for arriving at the final Project grade. Although two points above have been marked
as being of PRIMARY IMPORTANCE, all points will be taken into consideration and
marks may be lost for failing to do a thorough job. Remember that work done at the last minute
always looks just like that.
Late submissions will be
penalized. The late penalty will be 10% if late
within 24 hours of due date/time; the penalty will be 25% of the project grade,
applied after 24 hours from due date/time. No late submissions will be accepted after 2 days (ie.
48 hours) following the due date – such projects will receive a grade of zero
(0).
Copyright ©
Robert D. Kent, Ph. D. September,
2015 All
rights reserved.