Some of the topics can be used for COSC 3P99 projects.

advertisement
COSC 4P14 – Project Guidelines
Project due date: 11 am, March 31, 2010
No late date
Project presentations starting from April 7, 2010
This is a research project on the advanced topics of computer networks. The project is to be done
preferably by a team of two students contributing equally to the project. In exceptional cases it may be done
by an individual student and then may involve proportionally less work.
I expect that working in a team will allow you to tackle more substantial research issues. If you have
trouble finding a project partner, I can help you get matched up with someone else by maintaining a list of
people seeking teammates.
It is important that you investigate a variety of literature in the area you have chosen. You do not need to
do an exhaustive literature search. You should, however, find at least 5 related references for your report.
Eventually, you may need to use our library's interlibrary loan facility.
Write first an introduction to the topic, discuss its significance, and present an overview of what is
currently known about it. Report then on some recent research or development activity related to your
topic. Discuss this new development, explaining its significance and comparing it with previous work.
The output of the project should be a report of 10 pages long (12 pt font, 1.5 line spacing, reasonable
margins). The report should be written using a word processor. Submit a hard copy to the instructor in the
class on the due date and e-mail its electronic version to c4p14a@cosc.brocku.ca.
A set of suggested project topics is included below.
You should specify composition of your team and research topic by February 13 th by sending me an
e-mail.
In case of your own proposal, clearly describe on one page the topic to be undertaken and submit your
proposal to me by e-mail at least a week in advance of the above deadline.
Evaluation: The primary criterion is that your report clearly discusses the topic and evaluate the reviewed
literature in your own words. You are expected to give some ideas of your own as well. Do not cut and
paste text you find from the web or other sources into your paper! I am interested in what you have to say,
and not what others have said. It is considered plagiarism if you include text which isn't attributed to its
source. You will have to submit your paper to a plagiarism-checking site on the web before it will be
marked.
Some of the topics can be used for COSC 3P99 projects.
Project presentation
Prepare, using PowerPoint, a 10 minutes/student (20 minutes/team) presentation of your project. Send the
PowerPoint file as an attachment to c4p14a@cosc.brocku.ca by due date of the project.
Print it out with 6 slides per page and submit it together with the project report in an envelope with
appropriate cover page. Be ready for class presentation on April 7.
List of possible research topics:











Architecture and protocols of the Bluetooth
Development and deployment of WiMAX, EVDO and HSPDA
Some aspects of wireless mobile ad hoc networks
Some aspects of wireless sensor networks
Future of wireless networks
Security of wireless networks
Fault Based Cryptanalysis
Assessment of a networked computer system vulnerability
Formal models of secure systems
Formal verification of security
Security in multilevel databases


Audio and video compression in the Internet
Future of the multimedia networking
Exemplary research topics proposal ( can be taken)
The Security of Diffie-Hellman Algorithm.
The security of Diffie-Hellman relies on the difficulty of the discrete logarithm problem. This project
describes attempts to determine what size primes are required for security. In particular, evaluate the secure
identification option of the Sun Network File System, which uses Diffie-Hellman algorithm with a prime p
of 192 bits.
Objectives:
•
•
•
•
To describe the different steps necessary to solve the discrete logarithm problem (DLP).
To discuss the state-of-the-art results obtained for the solution of DLP.
Present the SUN NFS cryptosystem, and discuss some of its deficiencies.
Recommendations in order to have a secure size for the prime number p used in the Diffie-Hellman
algorithm.
Download