60-367  -  Fall 2016

Individual Research Essays

 

Quick links:

·                 Submission Requirements

·                 Essay Topics

·                 Assessment

 


Submission Requirements

 

All Project Reports must be submitted to the instructor no later than Sunday, November 27, 2016 (23:59:59 ET) (1 second before midnight).  All Essay submissions must be sent by email as attached files to Dr. Kent at rkent@uwindsor.ca. 

 

All Project Reports must have:

·       Title page with project Title, course number (60-367-01), date and Student Name and Student ID number.

·       Introduction – explain the topic briefly, its history and similar “light stuff”, where (or how) is it used

·       In Depth – explain the technology in more detail, how does it work, what problems does it solve, who is responsible for it (creation, maintenance, approval, etc) and so on

·       Research and Development – where is the technology going, what are the problems being researched, is a new version emerging, and so on

·       Conclusion – very brief

·       References – a complete list of all references used, including research articles, websites, textbooks, trade magazines and so on

 

References MUST actually be used in a relevant manner in your Report.  When you state something that you do not fully understand, or that you do not prove or provide evidence of directly, you must reference those points or assertions.  Most textbooks and research articles show how proper referencing is done in essays and reports.  Under no circumstances may quoted materials appear without being enclosed within quotation marks, and appropriately referenced.

 


 

Essay Topics

 

Below are listed several Topic areas.  Each topic is broken down into subtopics – ONE of these subtopics must be covered by exactly ONE student.   Due to the number of subtopics versus students in the class, it is likely that some topics may be chosen by more than one student.  Each student must do their own work, but students are encouraged to form discussion groups.  The purpose of such groups is to improve the opportunities for each student to demonstrate and test their knowledge and to gain better perspectives on what constitutes good work versus inadequate or incomplete work.

 

In cases where students may wish to undertake a topic not listed, they are required to advise the Instructor before proceeding in order to receive approval.  Non-approved topics will receive a mark of 0.

 

Students should send a short list of 3-4 ranked topics (most wanted to least wanted) to Dr. Kent.  As topics are selected, this web page will be updated with some topics crossed out.

 

Last updated on October 5, 2016

 

Topic/Subtopic Quick Links:

 

·                  Topic #1.  Network Security:  Concepts

·                  Topic #2.  Network Security:  Practice

·                  Topic #3.  Network Security: Threats

·                  Topic #4.  Advanced Wireless Networking:  Wireless LANs

·                  Topic #5.  Advanced Wireless Networking:  Wireless WANs and Security Issues

·                  Topic #6.  Network Administration and Diagnostics

·                  Topic #7.  Network Applications: 1

·                  Topic #8.  Network Applications: 2

·                  Topic #9.  Broadband and Other ISP-Related Issues

·                  Topic #10. Network Gaming

·                  Topic #11. Global Positioning System

·                  Topic #12. Other topics by suggestion

 

NOTE: Topics already allocated to students will be crossed out.  Students should submit a list of several topics in ranked order (most wanted to least wanted).

Topic #1.  Network Security:  Concepts

 

Subtopics:

1.   Public/Private key encryption

2.   SSL/TLS

3.   Kerberos, authentication and key distribution

4.   Certificates and certificate authorities (e.g. VeriSign, Thawte)

5.   Digital Signatures

 

Topic #2.  Network Security:  Practice

 

Subtopics:

1.   Hardware and software firewalls

2.   Virtual private network security

3.   IPSec

4.   Intrusion Detection Systems

5.   PGP

 

Topic #3.  Network Security: Threats

 

Subtopics:

1.   Denial of Service attacks, avoidance and prevention

2.   Trojan Horses, Worms and Viruses

3.   Spoofing, Replay, Snooping/Sniffing attacks

4.  SQL injection attacks

5.  Botnets

 

Topic #4.  Advanced Wireless Networking:  Wireless LANs

 

Subtopics:

1.   802.11a

2.   802.11b/g (Note: both b and g are included)

3.   802.11 e, including quality of service

 

Topic #5.  Advanced Wireless Networking:  Wireless WANs and Security Issues

 

Subtopics:

1.   802.16 (broadband wireless)

2.   WEP (including its weaknesses) and WPA

3.   Similarities and differences between wireless WANs and mobile phone networks

 

Topic #6.  Network Administration and Diagnostics

 

Subtopics:

1.   Using ping and traceroute and other tools to test connectivity/routing

2.   PC network configuration (Address, subnet masks, DNS, etc., using either Windows or Linux as the OS – your choice)

3.   Querying and updating a routing table by hand, using the ‘route’ command

4.   Tools:  Ethereal and other frame sniffers (Data Link layer)

5.   Tools:  TCPDump and other datagram sniffers (Network layer)

6.   Tools:  Kismet and other wireless network sniffers

7.   Tools:  ARPwatch and other ARP packet sniffers

 

Topic #7.  Network Applications: 1

 

Subtopics:

1.   HTTP/WWW  (how it works, in detail)

2.   FTP  (how it works, in detail)

3.   NFS  (how it works, in detail)

4.   Instant messenging (how it works, in detail)

5.   E-Mail sending and receiving (how they work, in detail)

 

Topic #8.  Network Applications: 2

 

Subtopics:

1.   File sharing (e.g. BitTorrent, Gnutella, LimeWire)

2.   Active Directory

4.   Terminal Services, and similar programs

5.   Voice over IP software

6.   Video conferencing software (e.g. Jitsi Meet)

7.   Network simulators (e.g. Marionet)

 

Topic #9.  Broadband and Other ISP-Related Issues

 

Subtopics:

1.   Cable internet (roughly how it works)

2.   ADSL (roughly how it works)

3.   Broadband wireless

4.   Modems (roughly how they work)

5.   ISDN, T1/T3, and other fixed/leased links

6.   Business service with cable/DSL vs. residential service

7.   Broadband via satellite

 

Topic #10.  Network Gaming

 

Subtopics:

1.   Types of network games (e.g. first person shooters vs. web games), and performance issues related to online gaming

2.   LAN Gaming versus Internet Gaming (e.g. performance, types of games)

 

Topic #11.  Global Positioning System

 

Subtopics:

1.   Conceptual overview & how it works

2.   Triangulation and the effect of additional satellites

3.   Different hardware GPS setups and systems (e.g. commercial)

4.  Vehicular communication systems

 

Topic #12.  Other topics by suggestion

 

Subtopics:

1.   Students may elect to suggest a specific topic to Dr. Kent.  In all cases, the student must present the topic for approval by Dr. Kent before proceeding to do the work.  Non-approved topics will receive a grade of zero (0).

 

 


Assessment

 

Each individual submission will be evaluated based on the following criteria:

 

·       Length:  Variable, but most likely between 8-10 pages for each student.  It is almost certain that a report of 4 pages (title page, references page plus 2 pages of actual essay content) is too trivial and would receive a poor grade.

·       Clarity  - is it understandable, does it use appropriate language; has a spell checker and basic grammar check been done; are sentences grammatically complete?

·       Organization – spend time organizing your material in order to create a report that is logically structured and makes sense; it is most often the case that authors provide an organizational outline to the reader at the end of the Introduction section.

·       Completeness (PRIMARY IMPORTANCE)

o   does it define the issues completely and adequately?

o   is the report effective or does it leave unanswered questions, terms, explanations?

o   is the report focused on the topic?

·       Definitions and explanations (PRIMARY IMPORTANCE) – pay particular attention to satisfying each of the following considerations

o   Terminology

o   Purpose

o   Theory

o   Application

o   Technology

·       Quality and Adequacy of background research to support the submitted work product

·       References – complete and adequate references, proper (and consistent) referencing style within the report, proper use of quotations around quoted text, referencing of diagrams and other content copied from other sources

 

The evaluation of the Essay is necessarily subjective, although the criteria stated above will form the objective basis for arriving at the final Project grade.   Although two points above have been marked as being of PRIMARY IMPORTANCE, all points will be taken into consideration and marks may be lost for failing to do a thorough job.

 

Late submissions will be penalized.  The late penalty will be 10% if late within 24 hours of due date/time; the penalty will be 25% of the project grade, applied after 24 hours from due date/time.  No late submissions will be accepted after 2 days (ie. 48 hours) following the due date – such projects will receive a grade of zero (0).

 

 

 


 

Copyright  ©   Robert D. Kent, Ph. D.  September, 2016    All rights reserved.