All Project Reports must be submitted to the
instructor no later than Sunday,
November 27, 2016 (23:59:59 ET) (1 second before midnight). All Essay submissions must be sent by email
as attached files to Dr. Kent at rkent@uwindsor.ca.
All Project Reports must have:
· Title
page with project Title, course number (60-367-01), date and Student Name and
Student ID number.
· Introduction
– explain the topic briefly, its history and similar “light stuff”, where (or
how) is it used
· In
Depth – explain the technology in more detail, how does it work, what problems
does it solve, who is responsible for it (creation, maintenance, approval, etc)
and so on
· Research
and Development – where is the technology going, what are the problems being
researched, is a new version emerging, and so on
· Conclusion
– very brief
· References
– a complete list of all references used, including research articles,
websites, textbooks, trade magazines and so on
References MUST actually be used in a relevant manner
in your Report. When you state something
that you do not fully understand, or that you do not prove or provide evidence
of directly, you must reference those points or assertions. Most textbooks and research articles show how
proper referencing is done in essays and reports. Under no circumstances may quoted materials
appear without being enclosed within quotation marks, and appropriately
referenced.
Below are listed several Topic areas. Each topic is broken down into subtopics – ONE of these subtopics must be covered by
exactly ONE student.
Due to the number of subtopics versus students in the class, it is
likely that some topics may be chosen by more than one student. Each student must do their own work, but
students are encouraged to form discussion groups. The purpose of such groups is to improve the
opportunities for each student to demonstrate and test their knowledge and to
gain better perspectives on what constitutes good work versus inadequate or
incomplete work.
In cases where students may wish to
undertake a topic not listed, they are required to advise the Instructor before
proceeding in order to receive approval.
Non-approved topics will receive a mark of 0.
Students should send a short list of 3-4
ranked topics (most wanted to least wanted) to Dr. Kent. As topics are selected, this web page will be
updated with some topics crossed out.
Last updated on October 5, 2016
Topic/Subtopic
Quick Links:
·
Topic
#1. Network Security: Concepts
·
Topic
#2. Network Security: Practice
·
Topic
#3. Network Security: Threats
·
Topic
#4. Advanced Wireless Networking: Wireless LANs
·
Topic
#5. Advanced Wireless Networking: Wireless WANs and Security Issues
·
Topic
#6. Network Administration and
Diagnostics
·
Topic
#7. Network Applications: 1
·
Topic
#8. Network Applications: 2
·
Topic
#9. Broadband and Other ISP-Related
Issues
·
Topic
#11. Global Positioning System
·
Topic
#12. Other topics by suggestion
NOTE: Topics already allocated to students will be
crossed out. Students should submit a
list of several topics in ranked order (most wanted to least wanted).
Subtopics:
1. Public/Private key
encryption
2. SSL/TLS
3. Kerberos,
authentication and key distribution
4. Certificates and certificate authorities
(e.g. VeriSign, Thawte)
5. Digital Signatures
Subtopics:
1. Hardware and software
firewalls
2. Virtual private network
security
3. IPSec
4. Intrusion Detection
Systems
5. PGP
Subtopics:
1. Denial of Service
attacks, avoidance and prevention
2. Trojan Horses, Worms
and Viruses
3. Spoofing, Replay, Snooping/Sniffing
attacks
4. SQL
injection attacks
5. Botnets
Subtopics:
1. 802.11a
2. 802.11b/g (Note: both b
and g are included)
3. 802.11 e, including
quality of service
Subtopics:
1. 802.16 (broadband
wireless)
2. WEP (including its
weaknesses) and WPA
3. Similarities and
differences between wireless WANs and mobile phone networks
Subtopics:
1. Using ping and
traceroute and other tools to test connectivity/routing
2. PC network
configuration (Address, subnet masks, DNS, etc., using either Windows or Linux
as the OS – your choice)
3. Querying and updating a
routing table by hand, using the ‘route’ command
4. Tools: Ethereal
and other frame sniffers (Data Link layer)
5. Tools: TCPDump and other datagram sniffers (Network layer)
6. Tools: Kismet and
other wireless network sniffers
7. Tools: ARPwatch and other ARP packet sniffers
Subtopics:
1. HTTP/WWW (how it works, in detail)
2. FTP (how
it works, in detail)
3. NFS (how
it works, in detail)
4. Instant messenging (how it works, in detail)
5. E-Mail sending and
receiving (how they work, in detail)
Subtopics:
1. File sharing (e.g. BitTorrent, Gnutella, LimeWire)
2. Active Directory
4. Terminal Services, and
similar programs
5. Voice over IP software
6. Video conferencing
software (e.g. Jitsi Meet)
7. Network simulators
(e.g. Marionet)
Subtopics:
1. Cable internet (roughly
how it works)
2. ADSL (roughly how it
works)
3. Broadband wireless
4. Modems (roughly how
they work)
5. ISDN, T1/T3, and other
fixed/leased links
6. Business service with
cable/DSL vs. residential service
7. Broadband via satellite
Subtopics:
1. Types of network games (e.g.
first person shooters vs. web games), and performance issues related to
online gaming
2. LAN Gaming versus
Internet Gaming (e.g. performance, types of games)
Subtopics:
1. Conceptual overview
& how it works
2. Triangulation and the
effect of additional satellites
3. Different hardware GPS
setups and systems (e.g. commercial)
4. Vehicular
communication systems
Subtopics:
1. Students may elect to
suggest a specific topic to Dr. Kent. In
all cases, the student must present the topic for approval by Dr. Kent before
proceeding to do the work. Non-approved
topics will receive a grade of zero (0).
Each individual submission will be
evaluated based on the following criteria:
·
Length: Variable, but most likely between 8-10
pages for each student. It is almost
certain that a report of 4 pages (title page, references page plus 2 pages of
actual essay content) is too trivial and would receive a poor grade.
·
Clarity - is it
understandable, does it use appropriate language; has a spell checker and basic
grammar check been done; are sentences grammatically complete?
·
Organization – spend time organizing your material in
order to create a report that is logically structured and makes sense; it is
most often the case that authors provide an organizational outline to the
reader at the end of the Introduction section.
·
Completeness (PRIMARY IMPORTANCE)
o
does it
define the issues completely and adequately?
o
is the
report effective or does it leave unanswered questions, terms, explanations?
o
is the
report focused on the topic?
·
Definitions and explanations (PRIMARY IMPORTANCE) –
pay particular attention to satisfying each of the following considerations
o
Terminology
o
Purpose
o
Theory
o
Application
o
Technology
·
Quality and Adequacy of background research to support
the submitted work product
·
References – complete and adequate references, proper
(and consistent) referencing style within the report, proper use of quotations
around quoted text, referencing of diagrams and other content copied from other
sources
The evaluation of the Essay is necessarily subjective,
although the criteria stated above will form the objective basis for arriving
at the final Project grade. Although
two points above have been marked as being of PRIMARY IMPORTANCE, all points
will be taken into consideration and marks may be lost for failing to do a
thorough job.
Late submissions will be penalized. The late penalty will be 10% if late within 24 hours of due date/time;
the penalty will be 25% of the project grade, applied after 24 hours from due
date/time. No late submissions will be accepted after 2
days (ie. 48 hours) following the due date – such
projects will receive a grade of zero (0).
Copyright ©
Robert D. Kent, Ph. D. September,
2016 All
rights reserved.