• How it works

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

Computer Networking Dissertation Topics

Published by Carmen Troy at January 5th, 2023 , Revised On August 16, 2023

A dissertation is an essential aspect of completing your degree program. Whether you are pursuing your master’s or are enrolled in a PhD program, you will not be awarded a degree without successfully submitting a thesis. To ensure that your thesis is submitted successfully without any hindrances, you should first get your topic and dissertation outline approved by your professor. When approving, supervisors focus on a lot of aspects. However, relevance, recency, and conciseness of your topic play a huge role in accepting or rejecting your topic.

As a computer networking student, you have a variety of networking topics to choose from. With the field evolving with each passing day, you must ensure that your thesis covers recent computer networking topics and explores a relevant problem or issue. To help you choose the right topic for your dissertation, here is a list of recent and relevant computer networking dissertation topics.

2022 Computer Networking Dissertation Topics

Topic 1: an evaluation of the network security during machine to machine communication in iot.

Research Aim: The research aims to evaluate the network security issues associated with M2M communication in IoT.

 Objectives:

  • To evaluate the factors affecting the network security of IoT devices.
  • To determine the methods for increasing data integrity in M2M communication against physical tampering and unauthorised monitoring.
  • To evaluate the network security issues associated with M2M communication in IoT and offer suitable recommendations for improvement.

Topic 2: An analysis of the cybersecurity challenges in public clouds and appropriate intrusion detection mechanisms.

Research Aim: The aim of the research is to analyse the cybersecurity challenges in public clouds and the appropriate intrusion detection mechanisms.

Objectives:

  • To analyse the types of cybersecurity threats impacting public clouds.
  • To determine some of the competent intrusion detection techniques that can be used in cloud computing.
  • To investigate the cybersecurity challenges in public clouds and offer mitigating with appropriate intrusion detection techniques.

Topic 3: Investigating the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

Research Aim: The research aims to investigate the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

  • To analyse the benefits of SaaS ERP over traditional ERP.
  • To evaluate the characteristics of SaaS architecture in cloud computing and determine its varieties.
  • To investigate how SaaS cloud ERP impacts business scalability and cost-effectiveness.

Topic 4: An evaluation of the requirements of cloud repatriation and the challenges associated with it.

Research Aim: The research aims to evaluate the requirements of cloud repatriation in organisations and the associated challenges

  • To analyse the key factors of cloud repatriation.
  • To determine the challenges associated with cloud repatriation from public clouds.
  • To evaluate the need for cloud repatriation in organisations and the associated complexities

Topic 5: An examination of the security mechanisms in decentralised networks and the ways of enhancing system robustness

Research Aim: The research aims to investigate the security mechanisms in decentralised networks and the ways of enhancing system robustness.

  • To analyse the concept of decentralised networks and understand its difference from centralised networks.
  • To analyse the security mechanisms in decentralised networks for determining how it offers visibility and traceability.
  • To investigate the security mechanisms in decentralised networks and how system robustness can be increased for better privacy and security.

Computer Networking Dissertation Topics for 2021

Exploring the importance of computer networking in today’s era.

Research Aim: Even though computer networking has been practised for a few years now, its importance has increased immensely over the past two years. A few main reasons include the use of technology by almost every business and the aim to offer customers an easy and convenient shopping experience. The main aim of this research will be to explain the concepts of computer networking, its benefits, and its importance in the current era. The research will also discuss how computer networking has helped businesses and individuals perform their work and benefit from it. The research will then specifically state examples where computer networking has brought positive changes and helped people achieve what they want.

Wireless Networks in Business Settings – An Analysis

Research Aim: Wireless networks are crucial in computer networking. They help build networks seamlessly, and once the networks are set up on a wireless network, it becomes extremely easy for the business to perform its daily activities. This research will investigate all about wireless networks in a business setting. It will first introduce the various wireless networks that can be utilized by a business and will then talk about how these networks help companies build their workflow around it. The study will analyze different wireless networks used by businesses and will conclude how beneficial they are and how they are helping the business.

Understanding Virtual Private Networks – A Deep Analysis of their Challenges

Research Aim: Private virtual networks (VPN) are extremely common today. These are used by businesses and individuals alike. This research aims to understand how these networks operate and how they help businesses build strong and successful systems and address the challenges of VPNs. A lot of businesses do not adopt virtual private networks due to the challenges that they bring. This research will address these challenges in a way that will help businesses implement VPN successfully.

A Survey of the Application of Wireless Sensor Networks

Research Aim: Wireless sensor networks are self-configured, infrastructure-less wireless networks to pass data. These networks are now extremely popular amongst businesses because they can solve problems in various application domains and possess the capacity to change the way work is done. This research will investigate where wireless sensor networks are implemented, how they are being used, and how they are performing. The research will also investigate how businesses implement these systems and consider factors when utilizing these wireless sensor networks.

Computer Network Security Attacks – Systems and Methods to Respond

Research Aim: With the advent of technology today, computer networks are extremely prone to security attacks. A lot of networks have security systems in place. However, people with nefarious intent find one way to intrude and steal data/information. This research will address major security attacks that have impacted businesses and will aim to address this challenge. Various methods and systems will be highlighted to protect the computer networks. In addition to this, the research will also discuss various methods to respond to attacks and to keep the business network protected.

Preventing a Cyberattack – How Can you Build a Powerful Computer Network?

Research Aim: Cyberattacks are extremely common these days. No matter how powerful your network is, you might be a victim of phishing or hacking. The main aim of this research will be to outline how a powerful computer network can be built. Various methods to build a safe computer network that can keep data and information will be outlined, and the study will also highlight ways to prevent a cyberattack. In addition to this, the research will talk about the steps that should be taken to keep the computer network safe. The research will conclude with the best way and system to build a powerful and safe computer network.

Types of Computer Networks: A Comparison and Analysis

Research Aim: There are different types of computer networks, including LAN, WAN, PAN, MAN, CAN, SAN, etc. This research will discuss all the various types of computer networks to help readers understand how all these networks work. The study will then compare the different types of networks and analyze how each of them is implemented in different settings. The dissertation will also discuss the type of computer networks that businesses should use and how they can utilize them for their success. The study will then conclude which computer network is the best and how it can benefit when implemented.

Detecting Computer Network Attacks by Signatures and Fast Content Analysis

Research Aim: With technological advancement, today, many computer network attacks can be detected beforehand. While many techniques are utilized for detecting these attacks, the use of signatures and fast content analysis are the most popular ones. This research will explore these techniques in detail and help understand how they can detect a computer network attack and prevent it. The research will present different ways these techniques are utilised to detect an attack and help build powerful and safe computer networks. The research will then conclude how helpful these two techniques are and whether businesses should implement them.

Overview of Wireless Network Technologies and their Role in Healthcare

Research Aim: Wireless network technologies are utilised by several industries. Their uses and benefits have helped businesses resolve many business problems and assisted them in conducting their daily activities without any hindrance. This networking topic will help explore how wireless network technologies work and will talk about their benefits. This research aims to find out how wireless technologies help businesses carry out their daily routine tasks effortlessly. For this research, the focuas will be the healthcare industry. The study will investigate how wireless network technology has helped the healthcare sector and how it has benefited them to perform their daily tasks without much effort.

Setting up a Business Communication System over a Computer Network

Research Aim: Communication is an essential aspect of every business. Employees need to communicate effectively to keep the business going. In the absence of effective communication, businesses suffer a lot as the departments are not synchronized, and the operations are haphazard. This research will explore the different ways through which network technologies help conduct smooth and effective communication within organizations. This research will conclude how wireless networks have helped businesses build effective communication systems within their organization and how they have benefited from it. It will then conclude how businesses have improved and solved major business problems with the help of these systems.

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find computer networking dissertation topics.

To find computer networking dissertation topics:

  • Follow industry news and emerging technologies.
  • Investigate unresolved networking challenges.
  • Review recent research papers.
  • Explore IoT, cybersecurity, cloud computing.
  • Consider real-world applications.
  • Select a topic aligned with your expertise and career aspirations.

You May Also Like

Here is a list of Research Topics on Philosophy to help you get started with the process of findings related dissertation idea of philosophy.

Need interesting and manageable chemical engineering dissertation topics or thesis? Here are the trending chemical engineering dissertation titles so you can choose the most suitable one.

Need interesting and manageable law dissertation topics or thesis? Here are the trending law dissertation titles so you can choose the most suitable one.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works

CrowJack

  • Calculators
  • Swot Analysis
  • Pestle Analysis
  • Five Forces Analysis
  • Organizational Structure
  • Copywriting
  • Research Topics
  • Student Resources

CrowJack

Services We Provide

proof-reading

Resources We Provide

blog

Login / Register

login

  • 15 Latest Networking Research Topics for Students

Kiara Miller - Image

Comparative analysis between snort and suricata IDS software(s)

Description of the topic

The main focus of this research is to conduct a comparative analysis between Snort and Suricata software to determine which IDS software can provide better performance. There are various IDS software(s) available that can be used by organizations but it is difficult to identify which one is best (Aldarwbi et al., 2022). Different organizational structures are often facing problems while setting up an IDS system which results in false positives and intrusions. Through this research, it can be identified which IDS software is better and what secure configuration is required to detect intrusions (Waleed et al., 2022).

Research objectives

  • To evaluate Snort and Suricata IDS software(s) to determine the most optimal one.
  • To identify the false positive rate of Snort and Suricata on the networked environment.

Research questions

RQ1: Which IDS software can perform better on the production network in terms of performance, security, scalability and reliability?

RQ2: What different ways can be followed to deal with false positive problems in IDS technology?

Research methodology

The given research objectives and research questions can be addressed using quantitative research methodology where an experimental approach can be followed. For the given topic, both Snort and Suricata IDS systems should be configured and tested against different attacks. Depending on the findings, it can be analyzed which IDS software can perform better in terms of performance and security (Shuai & Li, 2021).

  • Aldarwbi, M.Y., Lashkari, A.H. and Ghorbani, A.A. (2022) “The sound of intrusion: A novel network intrusion detection system,” Computers and Electrical Engineering , 104, p. 108455.
  • Shuai, L. and Li, S. (2021) “Performance optimization of Snort based on DPDK and Hyperscan,” Procedia Computer Science , 183, pp. 837-843.
  • Waleed, A., Jamali, A.F. and Masood, A. (2022) “Which open-source ids? Snort, Suricata or Zeek,” Computer Networks , 213, p. 109116.

Role of honeypots and honey nets in network security

Network Security has become essential nowadays and there is a need for setting up robust mechanisms to maintain confidentiality and integrity (Feng et al., 2023). Due to the number of security mechanisms available, organizations found it hard to finalize and implement them on their network. For example, honey pots and honeynet approaches look almost the same and have the same purpose but work differently. Under this research topic, the configuration of honeynets and honeypots can be done to check which one can perform better security in terms of trapping cyber attackers. The entire implementation can be carried out in the cloud-based instance for improved security and it can be identified which type of honey pot technology must be preferred (Maesschalck et al., 2022).

  • To set up a honey pot system using Open Canary on the virtual instance to protect against cyber attackers.
  • To set up a honeynet system on the virtual instance to assure protection is provided against malicious attackers.
  • To test honeypots and honeynets by executing DDoS attacks to check which can provide better security.

RQ1: Why is there a need for using honeypots over honey pots in a production networked environment?

RQ2: What are the differences between cloud-based and local honey pot systems for endpoint protection?

This research can be carried out using the quantitative method of research. At the initial stage, the implementation of honeypots and honeypots can be done on the virtual instance following different security rules. Once the rules are applied, the testing can be performed using a Kali Linux machine to check whether honey pots were effective or honeynets (Gill et al., 2020).

  • Feng, H. et al. (2023) “Game theory in network security for Digital Twins in industry,” Digital Communications and Networks [Preprint].
  • Gill, K.S., Saxena, S. and Sharma, A. (2020) “GTM-CSEC: A game theoretic model for cloud security based on ids and Honeypot,” Computers & Security , 92, p. 101732
  • Maesschalck, S. et al. (2022) “Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security,” Computers & Security , 114, p. 102598.

How do malware variants are progressively improving?

This research can be based on evaluating how malware variants are progressively improving and what should be its state in the coming future. Malware is able to compromise confidential user’s information assets which is why this research can be based on identifying current and future consequences owing to its improvements (Deng et al., 2023). In this field, there is no research work that has been carried out to identify how malware variants are improving their working and what is expected to see in future. Once the evaluation is done, a clear analysis can also be done on some intelligent preventive measures to deal with dangerous malware variants and prevent any kind of technological exploitation (Tang et al., 2023).

  • To investigate types of malware variants available to learn more about malware's hidden features.
  • To focus on future implications of malware executable programs and how they can be avoided.
  • To discuss intelligent solutions to deal with all malware variants.

RQ1: How do improvements in malware variants impact enterprises?

RQ2: What additional solutions are required to deal with malware variants?

In this research, qualitative analysis can be conducted on malware variants and the main reason behind their increasing severity. The entire research can be completed based on qualitative research methodology to answer defined research questions and objectives. Some real-life case studies should also be integrated into the research which can be supported by the selected topic (Saidia Fasci et al., 2023).

  • Deng, H. et al. (2023) “MCTVD: A malware classification method based on three-channel visualization and deep learning,” Computers & Security , 126, p. 103084.
  • Saidia Fasci, L. et al. (2023) “Disarming visualization-based approaches in malware detection systems,” Computers & Security , 126, p. 103062.
  • Tang, Y. et al. (2023) “BHMDC: A byte and hex n-gram based malware detection and classification method,” Computers & Security , p. 103118.

Implementation of IoT - enabled smart office/home using cisco packet tracer

The Internet of Things has gained much more attention over the past few years which is why each enterprise and individual aims at setting up an IoT network to automate their processes (Barriga et al., 2023). This research can be based on designing and implementing an IoT-enabled smart home/office network using Cisco Packet Tracer software. Logical workspace, all network devices, including IoT devices can be used for preparing a logical network star topology (Elias & Ali, 2014). To achieve automation, the use of different IoT rules can be done to allow devices to work based on defined rules.

  • To set up an IoT network on a logical workspace using Cisco Packet Tracer simulation software.
  • To set up IoT-enabled rules on an IoT registration server to achieve automation (Hou et al., 2023).

RQ: Why is the Cisco packet tracer preferred for network simulation over other network simulators?

At the beginning of this research, a quantitative research methodology can be followed where proper experimental set-up can be done. As a packet tracer is to be used, the star topology can be used to interconnect IoT devices, sensors and other network devices at the home/office. Once a placement is done, the configuration should be done using optimal settings and all IoT devices can be connected to the registration server. This server will have IoT rules which can help in achieving automation by automatically turning off lights and fans when no motion is detected (Baggan et al., 2022).

  • Baggan, V. et al. (2022) “A comprehensive analysis and experimental evaluation of Routing Information Protocol: An Elucidation,” Materials Today: Proceedings , 49, pp. 3040–3045.
  • Barriga, J.A. et al. (2023) “Design, code generation and simulation of IOT environments with mobility devices by using model-driven development: Simulateiot-Mobile,” Pervasive and Mobile Computing , 89, p. 101751.
  • Elias, M.S. and Ali, A.Z. (2014) “Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course,” Procedia - Social and Behavioral Sciences , 131, pp. 11–15.
  • Hou, L. et al. (2023) “Block-HRG: Block-based differentially private IOT networks release,” Ad Hoc Networks , 140, p. 103059.

Comparative analysis between AODV, DSDV and DSR routing protocols in WSN networks

For wireless sensor networks (WSN), there is a major need for using WSN routing rather than performing normal routines. As WSN networks are self-configured, there is a need for an optimal routing protocol that can improve network performance in terms of latency, jitter, and packet loss (Luo et al., 2023). There are often various problems faced when WSN networks are set up due to a lack of proper routing protocol selection. As a result of this, severe downtime is faced and all links are not able to communicate with each other easily (Hemanand et al., 2023). In this research topic, the three most widely used WSN routing protocols AODV, DSDV and DSR can be compared based on network performance. To perform analysis, three different scenarios can be created in network simulator 2 (Ns2).

  • To create three different scenarios on ns2 software to simulate a network for 1 to 100 seconds.
  • To analyze which WSN routing is optimal in terms of network performance metrics, including latency, jitter and packet loss.
  • To use CBR and NULL agents for all wireless scenarios to start with simulation purposes.

RQ: How do AODV, DSR and DSDV routing protocols differ from each other in terms of network performance?

This research can be carried out using a quantitative research method. The implementation for the provided research topic can be based on Ns2 simulation software where three different scenarios can be created (AODV, DSDV and DSR). For each scenario, NULL, CSR and UDP agents can be done to start with simulation for almost 1 to 100 seconds. For all transmissions made during the given time, network performance can be checked to determine which routing is best (Mohapatra & Kanungo, 2012).

  • Human and, D. et al. (2023) “Analysis of power optimization and enhanced routing protocols for Wireless Sensor Networks,” Measurement: Sensors , 25, p. 100610. Available at: https://doi.org/10.1016/j.measen.2022.100610.
  • Luo, S., Lai, Y. and Liu, J. (2023) “Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network,” Computers & Security , 126, p. 103083. Available at: https://doi.org/10.1016/j.cose.2022.103083.
  • Mohapatra, S. and Kanungo, P. (2012) “Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 Simulator,” Procedia Engineering , 30, pp. 69–76. Available at: https://doi.org/10.1016/j.proeng.2012.01.835.

Securing wireless network using AAA authentication and WLAN controller

Wireless networks often face intrusion attempts due to insecure protocols and sometimes open SSIDs. As a result of this, man-in-the-middle and eavesdropping attacks become easier which results in the loss of confidential information assets (Sivasankari & Kamalakkannan, 2022). When it comes to managing networks in a large area, there are higher chances for attacks that enable cyber attackers in intercepting ongoing communication sessions. However, there is currently no research conducted where the use of AAA authentication has been done with WLAN controllers to make sure a higher level of protection is provided (Nashwan, 2021). The proposed research topic can be based on securing wireless networks with the help of AAA authentication and WLAN controllers. The use of AAA authentication can be done to set up a login portal for users whilst the WLAN controller can be used for managing all wireless access points connected to the network (Nashwan, 2021).

  • To set up AAA authentication service on the wireless network simulated on Cisco Packet Tracer for proper access control.
  • To set up a WLAN controller on the network to manage all wireless access points effortlessly.
  • To use WPA2-PSK protocol on the network to assure guest users are only able to access wireless networks over a secure protocol.

RQ1: What additional benefits are offered by AAA authentication on the WLAN networks?

RQ2: Why are wireless networks more likely to face network intrusions than wired networks?

This research topic is based on the secure implementation of a wireless LAN network using a Cisco packet tracer. Hence, this research can be carried out using a quantitative research method. The implementation can be carried out using AAA authentication which can assure that access control is applied for wireless logins. On the other hand, a WLAN controller can also be configured which can ensure that all WAPs are managed (ZHANG et al., 2012).

  • Nashwan, S. (2021) “AAA-WSN: Anonymous Access Authentication Scheme for wireless sensor networks in Big Data Environment,” Egyptian Informatics Journal , 22(1), pp. 15–26.
  • Sivasankari, N. and Kamalakkannan, S. (2022) “Detection and prevention of man-in-the-middle attack in IOT network using regression modeling,” Advances in Engineering Software , 169, p. 103126.
  • ZHANG, J. et al. (2012) “AAA authentication for Network mobility,” The Journal of China Universities of Posts and Telecommunications , 19(2), pp. 81-86.

OWASP's approach to secure web applications from web application exploits

The research can revolve around the development of web applications by considering OWASP's top 10 rules. Usually, web applications are deployed by organizations depending on their requirements and these applications are vulnerable to various exploits, including injection, broken authentication and other forgery attacks (Poston, 2020). Identifying every single vulnerability is difficult when reference is not taken and often organizations end up hosting a vulnerable server that leads to privacy issues and compromises confidential information easily. In this research, OWASP's top 10 approaches can be followed to develop a secure web application that can be able to protect against top web application exploits. This approach is based on emphasizing severe and minor vulnerabilities which must be patched for protecting against web application attacks (Deepa & Thilagam, 2016).

  • The first objective can be setting up an insecure web application on the cloud environment which can be exploited with different techniques.
  • The second objective can be to consider all techniques and procedures provided by OWASP's top 10 methodologies.
  • The last objective can be applying all fixes to insecure web applications to make them resistant to OWASP top 10 attacks (Sonmez, 2019).

RQ1: What are the benefits of using OWASP's top 10 approaches to harden web applications in comparison to other security approaches?

The research methodology considered for this research project can be quantitative using an experimental approach. The practical work can be done for the selected topic using AWS or the Azure cloud platform. Simply, a virtual web server can be configured and set up with a secure and insecure web application. Following OWASP's top 10 techniques and procedures, the web application can be secured from possible attacks. In addition, insecure applications can also be exploited and results can be evaluated (Applebaum et al., 2021).

  • Applebaum, S., Gaber, T. and Ahmed, A. (2021) “Signature-based and machine-learning-based web application firewalls: A short survey,” Procedia Computer Science , 189, pp. 359–367. Available at: https://doi.org/10.1016/j.procs.2021.05.105.
  • Deepa, G. and Thilagam, P.S. (2016) “Securing web applications from injection and logic vulnerabilities: Approaches and challenges,” Information and Software Technology , 74, pp. 160–180. Available at: https://doi.org/10.1016/j.infsof.2016.02.005.
  • Poston, H. (2020) “Mapping the owasp top Ten to the blockchain,” Procedia Computer Science , 177, pp. 613-617. Available at: https://doi.org/10.1016/j.procs.2020.10.087.
  • Sonmez, F.Ö. (2019) “Security qualitative metrics for Open Web Application Security Project Compliance,” Procedia Computer Science , 151, pp. 998-1003. Available at: https://doi.org/10.1016/j.procs.2019.04.140.

Importance of configuring RADIUS (AAA) server on the network

User authentication has become significant nowadays as it guarantees that a legitimate user is accessing the network. But a problem is faced when a particular security control is to be identified for authentication and authorization. These controls can be categorized based on mandatory access controls, role-based access control, setting up captive portals and many more. Despite several other security controls, one of the most efficient ones is the RADIUS server (SONG et al., 2008). This server can authenticate users on the network to make sure network resources are accessible to only legal users. This research topic can be based on understanding the importance of RADIUS servers on the network which can also be demonstrated with the help of the Cisco Packet Tracer. A network can be designed and equipped with a RADIUS server to ensure only legal users can access network resources (WANG et al., 2009).

  • To configure RADIUS (AAA) server on the network which can be able to authenticate users who try to access network resources.
  • To simulate a network on a packet tracer simulation software and verify network connectivity.

RQ1: What are other alternatives to RADIUS (AAA) authentication servers for network security?

RQ2: What are the common and similarities between RADIUS and TACACS+ servers?

As a logical network is to be designed and configured, a quantitative research methodology can be followed. In this research coursework, a secure network design can be done using a packet tracer network simulator, including a RADIUS server along with the DMZ area. The configuration for the RADIUS server can be done to allow users to only access network resources by authenticating and authorizing (Nugroho et al., 2022).

  • Nugroho, Y.S. et al. (2022) “Dataset of network simulator related-question posts in stack overflow,” Data in Brief , 41, p. 107942.
  • SONG, M., WANG, L. and SONG, J.-de (2008) “A secure fast handover scheme based on AAA protocol in Mobile IPv6 Networks,” The Journal of China Universities of Posts and Telecommunications , 15, pp. 14-18.
  • WANG, L. et al. (2009) “A novel congestion control model for interworking AAA in heterogeneous networks,” The Journal of China Universities of Posts and Telecommunications , 16, pp. 97-101.

Comparing mod security and pF sense firewall to block illegitimate traffic

Firewalls are primarily used for endpoint security due to their advanced features ranging from blocking to IDS capabilities and many more. It is sometimes challenging to identify which type of firewall is best and due to this reason, agencies end up setting up misconfigured firewalls (Tiwari et al., 2022). This further results in a cyber breach, destroying all business operations. The research can be emphasizing conducting a comparison between the two most widely used firewalls i.e. Mod Security and pF sense. Using a virtualized environment, both firewalls can be configured and tested concerning possible cyber-attacks (Lu & Yang, 2020).

  • To use the local environment to set up Mod security and pF sense firewall with appropriate access control rules.
  • To test both firewalls by executing distributed denial of service attacks from a remote location.
  • To compare which type of firewall can provide improved performance and robust security.

RQ: How do Mod security and pF sense differ from each other in terms of features and performance?

The practical experimentation for both firewalls can be done using a virtualized environment where two different machines can be created. Hence, this research can be carried out using a quantitative research method . The first machine can have Mod security and the second machine can have pF sense configured. A new subnet can be created which can have these two machines. The third machine can be an attacking machine which can be used for testing firewalls. The results obtained can be then evaluated to identify which firewall is best for providing security (Uçtu et al., 2021).

  • Lu, N. and Yang, Y. (2020) “Application of evolutionary algorithm in performance optimization of Embedded Network Firewall,” Microprocessors and Microsystems , 76, p. 103087.
  • Tiwari, A., Papini, S. and Hemamalini, V. (2022) “An enhanced optimization of parallel firewalls filtering rules for scalable high-speed networks,” Materials Today: Proceedings , 62, pp. 4800-4805.
  • Uçtu, G. et al. (2021) “A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls,” Future Generation Computer Systems , 124, pp. 56-67.

Conducting a comprehensive investigation on the PETYA malware

The main purpose of this research is to conduct a comprehensive investigation of the PETYA malware variant (McIntosh et al., 2021). PETYA often falls under the category of ransomware attacks which not only corrupt and encrypt files but can compromise confidential information easily. Along with PETYA, there are other variants also which lead to a security outage and organizations are not able to detect these variants due to a lack of proper detection capabilities (Singh & Singh, 2021). In this research, a comprehensive analysis has been done on PETYA malware to identify its working and severity level. Depending upon possible causes of infection of PETYA malware, some proactive techniques can also be discussed (Singh & Singh, 2021). A separation discussion can also be made on other malware variants, their features, and many more.

  • The main objective of this research is to scrutinize the working of PETYA malware because a ransomware attack can impact the micro and macro environment of the organizations severely.
  • The working of PETYA malware along with its source code can be reviewed to identify its structure and encryption type.
  • To list all possible CVE IDs which are exploited by the PETYA malware.

RQ1: How dangerous is PETYA malware in comparison to other ransomware malware?

This research can be based on qualitative research methodology to evaluate the working of PETYA malware from various aspects, the methodology followed and what are its implications. The research can be initiated by evaluating the working of PETYA malware, how it is triggered, what encryption is applied and other factors. A sample source code can also be analyzed to learn more about how cryptography is used with ransomware (Abijah Roseline & Geetha, 2021).

  • Abijah Roseline, S. and Geetha, S. (2021) “A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks,” Computers & Electrical Engineering , 92, p. 107143.
  • McIntosh, T. et al. (2021) “Enforcing situation-aware access control to build malware-resilient file systems,” Future Generation Computer Systems , 115, pp. 568-582.
  • Singh, J. and Singh, J. (2021) “A survey on machine learning-based malware detection in executable files,” Journal of Systems Architecture , 112, p. 101861.

Setting up a Live streaming server on the cloud platform

Nowadays, various organizations require a live streaming server to stream content depending upon their business. However, due to a lack of proper hardware, organizations are likely to face high network congestion, slowness and other problems (Ji et al., 2023). Referring to the recent cases, it has been observed that setting up a streaming server on the local environment is not expected to perform better than a cloud-based streaming server configuration (Martins et al., 2019). This particular research topic can be based on setting up a live streaming server on the AWS or Azure cloud platform to make sure high network bandwidth is provided with decreased latency. The research gap analysis would be conducted to analyze the performance of live streaming servers on local and cloud environments in terms of network performance metrics (Bilal et al., 2018).

  • To set up a live streaming server on the AWS or Azure cloud platform to provide live streaming services.
  • To use load balancers alongside streaming servers to ensure the load is balanced and scalability is achieved.
  • To use Wireshark software to test network performance during live streaming.

RQ1: Why are in-house streaming servers not able to provide improved performance in comparison to cloud-based servers?

RQ2: What additional services are provided by cloud service providers which help in maintaining network performance?

The implementation is expected to carry out on the AWS cloud platform with other AWS services i.e. load balancer, private subnet and many more (Efthymiopoulou et al., 2017). Hence, this research can be carried out using a quantitative research method. The configuration of ec2 instances can be done which can act as a streaming server for streaming media and games. For testing this project, the use of OBS studio can be done which can help in checking whether streaming is enabled or not. For network performance, Wireshark can be used for testing network performance (George et al., 2020).

  • Bilal, KErbad, A. and Hefeeda, M. (2018) “QoE-aware distributed cloud-based live streaming of multi-sourced Multiview Videos,” Journal of Network and Computer Applications , 120, pp. 130-144.
  • Efthymiopoulou, M. et al. (2017) “Robust control in cloud-assisted peer-to-peer live streaming systems,” Pervasive and Mobile Computing , 42, pp. 426-443.
  • George, L.C. et al. (2020) “Usage visualization for the AWS services,” Procedia Computer Science , 176, pp. 3710–3717.
  • Ji, X. et al. (2023) “Adaptive QoS-aware multipath congestion control for live streaming,” Computer Networks , 220, p. 109470.
  • Martins, R. et al. (2019) “Iris: Secure reliable live-streaming with Opportunistic Mobile Edge Cloud offloading,” Future Generation Computer Systems , 101, pp. 272-292.

Significance of using OSINT framework for Network reconnaissance

Network reconnaissance is becoming important day by day when it comes to penetration testing. Almost all white hat hackers are dependent on the OSINT framework to start with network reconnaissance and footprinting when it comes to evaluating organizational infrastructure. On the other hand, cyber attackers are also using this technique to start fetching information about their target. Currently, there is no investigation carried out to identify how effective the OSINT framework is over traditional reconnaissance activities (Liu et al., 2022). This research is focused on using OSINT techniques to analyze victims using different sets of tools like Maltego, email analysis and many other techniques. The analysis can be based on fetching sensitive information about the target which can be used for conducting illegal activities (Abdullah, 2019).

  • To use Maltego software to conduct network reconnaissance on the target by fetching sensitive information.
  • To compare the OSINT framework with other techniques to analyze why it performs well.

RQ1: What is the significance of using the OSINT framework in conducting network reconnaissance?

RQ2: How can the OSINT framework be used by cyber hackers for conducting illegitimate activities?

The OSINT framework is easily accessible on its official website where different search options are given. Hence, this research can be carried out using a quantitative research method. Depending upon the selected target, each option can be selected and tools can be shortlisted for final implementation. Once the tools are shortlisted, they can be used to conduct network reconnaissance (González-Granadillo et al., 2021). For example, Maltego can be used as it is a powerful software to fetch information about the target.

  • Abdullah, S.A. (2019) “Seui-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks,” Engineering Science and Technology , an International Journal, 22(2), pp. 667–672.
  • Gonzalez-Granadillo, G. et al. (2021) “ETIP: An enriched threat intelligence platform for improving OSINT correlation, analysis, visualization and sharing capabilities,” Journal of Information Security and Applications , 58, p. 102715.
  • Liu, W. et al. (2022) “A hybrid optimization framework for UAV Reconnaissance Mission Planning,” Computers & Industrial Engineering , 173, p. 108653.

Wired and wireless network hardening in cisco packet tracer

At present, network security has become essential and if enterprises are not paying attention to the security infrastructure, there are several chances for cyber breaches. To overcome all these issues, there is a need for setting up secure wired and wireless networks following different techniques such as filtered ports, firewalls, VLANs and other security mechanisms. For the practical part, the use of packet tracer software can be done to design and implement a highly secure network (Sun, 2022).

  • To use packet tracer simulation software to set up secure wired and wireless networks.
  • Use different hardening techniques, including access control rules, port filtering, enabling passwords and many more to assure only authorized users can access the network (Zhang et al., 2012).

RQ: Why is there a need for emphasizing wired and wireless network security?

Following the quantitative approach, the proposed research topic implementation can be performed in Cisco Packet Tracer simulation software. Several devices such as routers, switches, firewalls, wireless access points, hosts and workstations can be configured and interconnected using Cat 6 e cabling. For security, every device can be checked and secure design principles can be followed like access control rules, disabled open ports, passwords, encryption and many more (Smith & Hasan, 2020).

  • Smith, J.D. and Hasan, M. (2020) “Quantitative approaches for the evaluation of Implementation Research Studies,” Psychiatry Research , 283, p. 112521.
  • Sun, J. (2022) “Computer Network Security Technology and prevention strategy analysis,” Procedia Computer Science , 208, pp. 570–576.
  • Zhang, YLiang, R. and Ma, H. (2012) “Teaching innovation in computer network course for undergraduate students with a packet tracer,” IERI Procedia , 2, pp. 504–510.

Different Preemptive ways to resist spear phishing attacks

When it comes to social engineering, phishing attacks are rising and are becoming one of the most common ethical issues as it is one of the easiest ways to trick victims into stealing information. This research topic is based on following different proactive techniques which would help in resisting spear phishing attacks (Xu et al., 2023). This can be achieved by using the Go-Phish filter on the machine which can automatically detect and alert users as soon as the phished URL is detected. It can be performed on the cloud platform where the apache2 server can be configured along with an anti-phishing filter to protect against phishing attacks (Yoo & Cho, 2022).

  • To set up a virtual instance on the cloud platform with an apache2 server and anti-phishing software to detect possible phishing attacks.
  • To research spear phishing and other types of phishing attacks that can be faced by victims (Al-Hamar et al., 2021).

RQ1: Are phishing attacks growing just like other cyber-attacks?

RQ2: How effective are anti-phishing filters in comparison to cyber awareness sessions?

The entire research can be conducted by adhering to quantitative research methodology which helps in justifying all research objectives and questions. The implementation of the anti-phishing filter can be done by creating a virtual instance on the cloud platform which can be configured with an anti-phishing filter. Along with this, some phishing attempts can also be performed to check whether the filter works or not (Siddiqui et al., 2022).

  • Al-Hamar, Y. et al. (2021) “Enterprise credential spear-phishing attack detection,” Computers & Electrical Engineering , 94, p. 107363.
  • Siddiqui, N. et al. (2022) “A comparative analysis of US and Indian laws against phishing attacks,” Materials Today: Proceedings , 49, pp. 3646–3649.
  • Xu, T., Singh, K. and Rajivan, P. (2023) “Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks,” Applied Ergonomics , 108, p. 103908.
  • Yoo, J. and Cho, Y. (2022) “ICSA: Intelligent chatbot security assistant using text-CNN and multi-phase real-time defense against SNS phishing attacks,” Expert Systems with Applications , 207, p. 117893.

Evaluating the effectiveness of distributed denial of service attacks

The given research topic is based on evaluating the effectiveness of distributed denial of service attacks on cloud and local environments. Hence, this research can be carried out using a quantitative research method. Cyber attackers find DDoS as one of the most dangerous technological exploitation when it comes to impacting network availability (Krishna Kishore et al., 2023). This research can revolve around scrutinizing the impact of DDoS attacks on the local environment and cloud environment. This can be done by executing DDoS attacks on a simulated environment using hoping or other software(s) to check where it has a higher magnitude (de Neira et al., 2023).

  • To set up a server on the local and cloud environment to target using DDoS attacks for checking which had experienced slowness.
  • To determine types of DDoS attack types, their magnitude and possible mitigation techniques.

RQ: Why do DDoS attacks have dynamic nature and how is it likely to sternly impact victims?

The experimentation for this research can be executed by creating a server on the local and cloud environment. Hence, this research can be carried out using a quantitative research method. These servers can be set up as web servers using apache 2 service. On the other hand, a Kali Linux machine can be configured with DDoS execution software. Each server can be targeted with DDoS attacks to check its effectiveness (Benlloch-Caballero et al., 2023).

  • Benlloch-Caballero, P., Wang, Q. and Alcaraz Calero, J.M. (2023) “Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IOT networks from distributed denial of service attacks,” Computer Networks , 222, p. 109526.
  • de Neira, A.B., Kantarci, B. and Nogueira, M. (2023) “Distributed denial of service attack prediction: Challenges, open issues and opportunities,” Computer Networks , 222, p. 109553.
  • Krishna Kishore, P., Ramamoorthy, S. and Rajavarman, V.N. (2023) “ARTP: Anomaly-based real time prevention of distributed denial of service attacks on the web using machine learning approach,” International Journal of Intelligent Networks , 4, pp. 38–45.

Recommended Readings

Latest Web Development Research Topics

Top Management Research Topics

Newest AI Research Topics

15 Latest Networking Research Topics for Students

Research in every field is becoming more and more essential because of constant developments around the world. Similar is the case in the field of networking. This is the reason; students who are preparing to master the field of networking need to keep their knowledge of the current state of the art in the field up to date.

However, choosing the right research topic often becomes a tough task for students to carry out their research effectively. That being the case, this list contains 15 latest research topics in the field of networking. Whether you are a seasoned researcher or just starting, this list can provide you with ample inspiration and guidance to drive your research forward in the dynamic and evolving field of Networking.

Facebook

Copyright © 2023 CrowJack. All Rights Reserved

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Chair of Communication Networks
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Student Work

We offer students the opportunity to actively participate on interesting and cutting edge research topics and concrete research projects by conducting their thesis in our group.

We offer topics for your Bachelor's Thesis (BA) and Master's Thesis (MA) to successfully complete your studies with a scientific work. We offer students of the Department of Electrical and Computer Engineering to supervise your Forschungspraxis (FP) (research internship /industrial internship) and Ingenieurpraxis (IP) directly at our chair. For students with other specializations, such as Informatics, we offer opportunities to supervise your Interdisciplinary Project (IDP) (German: "Interdisziplinäres Projekt (IDP)"). Please contact us directly for more information.

This page also lists open positions for paid student work in projects (Werkstudent, Studentische Hilfskraft) (SHK).

Please note: For some topics different types of theses are possible. We adapt the goals then to fit the respective requirements and workload (e.g. BA or MA or internship).

Please note: On this page we also list student theses that are already assigned to students (Ongoing Thesis), so you can get an impression on the range of topics that we have at our Chair. Nevertheless, if you are interested in one of the topics of already ongoing theses, please do not hesitate to directly contact the supervisor and ask if there are any plans for follow-up topics. Many times this is actually the case.

Open Thesis

Ba , ma , idp , fp , shk : advancing real-time network simulations to real world behaviour.

  • Open thesis as PDF.

Advancing Real-time Network Simulations to Real World Behaviour

Description.

networking thesis proposal

Testing real-time application and networks is very timing sensitive. It is very hard to get this precision and accuracy in the real-world. However, the real-world itself also behaves different then simualtions. Our Simulator behaves like the theory dictates and allows us to get these precise timing, but needs to be tested and exteded to behave more like a real-network would

Requirements

  • Knowledge of NS-3
  • Knowledge of Python
  • Knowledge of C/C++

Please contact me for more information ([email protected])

Supervisor:

Fp , shk : working student - real-time network controller for research, working student - real-time network controller for research.

Chameleon is a real-time network controller that guarantees packet latencies for admitted flows. However, Chameleon is designed to work in high performance environments. For research and development, a different approach that offers more debugging and extension capablites would suit us better.

  • Create Real-time Network Controller
  • Controller needs to be easy to debug
  • Controller needs to be easy to extend
  • Controller needs to have good logging and tracing

Requirements:

  • Advanced Knowledge of C/C++
  • Advanced Knowledge of Python

Amaury Van Bemten, Nemanja Ðeri?, Amir Varasteh, Stefan Schmid, Carmen Mas-Machuca, Andreas Blenk, and Wolfgang Kellerer. 2020. Chameleon: Predictable Latency and High Utilization with Queue-Aware and Adaptive Source Routing. In The 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’20), December 1–4, 2020, Barcelona, Spain. ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3386367. 3432879

BA , MA , IDP , FP , SHK : Controlling Stochastic Network Flows for Real-time Networking

Controlling stochastic network flows for real-time networking.

Any data that is sent in a real-time network is monitored and accounted for. This allows us with the help of some mathematical frameworks to calculate upper bounds for the latency of the flow. These frameworks and controllers often consider hard real-time guarantees. This means that every packet arrives in time every time. With soft real-time guarantees, this is not the case. Here, we are allowed to have some leeway

In this thesis, we want to explore how we can model and admit network flows that have a stochastical nature.

Please contact me for more information ([email protected])!!

SHK : Working Student: Framework for Testing Realtime Networks

Working student: framework for testing realtime networks.

Testing a Network Controller, custom real-time protocols, or verifying simulations with emulations requires a lot of computing effort. This is why we are developing a framework that helps you run parallel networking experiments. This framework also increases the reproducibility of any networking experiment.

The main Task of this position is to help develop the general-purpose framework for executing parallel networking experiments.

  • Continue developing the Framework for multi server / multi app usage
  • Extend Web Capabilities of the Framework
  • Automate Starting and Stopping
  • Ease-of-use Improvements
  • Test the functionality
  • Basic Knowledge of Web-App Development (FastApi, React etc...)
  • Basic Knowledge of System Architecture Development

Feel free to contact me per mail ([email protected])

SHK : Working Student Infrastructure Service Management

Working student infrastructure service management.

We are seeking a highly motivated and detail-oriented Working Student to join our data center team. As a Working Student, you will assist in the daily operations of our data center, gaining hands-on experience in a fast-paced and dynamic environment.

Responsibilities:

  Assist with regular data center tasks, such as.

  • Rack and Stack equipment
  • Cable Management and organization
  • Perform basic troubleshooting and maintenance tasks
  • Assist with inventory management
  • Monitor data center systems and report any discrepancies or issues
  • Create the basis for our Data Center Infrastructure Management
  • Develop and maintain documentation of data center procedures and policies
  • Perform other duties as required to support the data center operations
  • Availability to work 8 - 10 hours per week with flexible scheduling to accommodate academic commitments
  • Basic knowledge of computer systems, networks, and data center operations
  • Basic knowledge in Python

SHK : Working Student for Implementing and Maintaining a 5G Roaming Testbed

Working student for implementing and maintaining a 5g roaming testbed.

5G is the newest generation of mobile networks allowing for higher data-rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). Roaming allows subscribers to connect to the internet via other network operator’s networks if they have a roaming agreement. We are looking for a student to help implement and maintain a 5G Roaming testbed. At first, that is planned as an open source testbed leveraging Open5GS. Later, the plan is to connect this open source testbed to the LKN campus network.

This working student position may run parallel to Master Theses with more focused implementation and evaluation works. The working student is welcome to follow up on this work with his/ her own research internship or Master’s thesis.

The primary objective of this work is to help implement and maintain a 5G Roaming testbed. This testbed shall then be used for investigation of security mechansims and performance measurements. Those are not the main job of the student, but the student is supposed to help.

1. Work into 5G Roaming

2. Implement missing Roaming functionalities into Open5GS

3. Maintain Roaming Testbed

4. Connect open source 5G Roaming testbed with Campus Network (once possible)

5. Aid in security investigations

6. Aid in performance measurements

7. Potentially add other NFs later

Prerequisites

• Motivation and team spirit

• Basic understanding of 5G networks advantageous; especially of the 5G core network

    – interest and motivation to learn the system are sufficient

• Programming knowledge in C useful (for Open5GS)

• Interest in Roaming functionalities

• Interest in security

Oliver Zeidler ([email protected])

Julian Sturm ([email protected])

MA : Implementing and Evaluating 5G Roaming Scenarios in an Open Source Testbed

Implementing and evaluating 5g roaming scenarios in an open source testbed.

5G is the newest generation of mobile networks allowing for higher data-rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). One of these NFs is responsible for Roaming connections. Roaming allows subscribers to connect to the internet via other network operators’ networks if they have a roaming agreement. Between two Public Land Mobile Networks (PLMNs) there are two standardised Roaming modes: Local Break Out and Home Routed Roaming. For Local Break Out Roaming only the control plane of the home network is accessed from the visited network, while the user data is directly transmitted to the Data Network (DN). For Home Routed Roaming the user data is routed through the home network to the DN. The goal of this thesis is to implement both Roaming versions in an open source core network and compare them regarding chosen KPIs, e.g. latency or throughput. Open5GS would be the primary choice for the open source core network, as it supports Local Break Out Roaming already. Home Routed Roaming is not yet supported.

A major part of 5G Roaming is the Security Edge Protection Proxy (SEPP), a 5G NF designed to establish and maintain a secure control plane connection between two PLMNs. Implementing it, or extending the existing implementation of Open5GS, will be an important part of this work. The SEPP is connected to other NFs in the same PLMN via Service Based Interfaces (SBIs) and to other PLMN’s SEPPs via the N32 interface.

The biggest difference between the two Roaming versions lies in the data plane routing, so implementing the connection between two User Plane Functions (UPFs), the N9 interface, is necessary to connect two PLMNs. The newly introduced Inter PLMN User Plane Security (IPUPS) used for additional security on this connection is initially considered out-of-scope for this work, but may be added later on.

1. Check Roaming functionalities of Open5GS

3. Run tests to investigate the differences between Home Routed and Local Break Out Roaming considering chosen KPIs

  • interest and motivation to learn the system are sufficient

• Interest in security would be nice, but is not needed (not the main focus of the work

BA , FP : Experimental Evaluation of xApp-related Vulnerabilities in the O-RAN's RAN Intelligent Controller Implementation

Experimental evaluation of xapp-related vulnerabilities in the o-ran's ran intelligent controller implementation.

In previous mobile network generations, Radio Access Networks (RAN) have been treated as a proprietary, closed network segment that is specific to every operator. To accelerate development and innovation, new initiatives such as the O-RAN ALLIANCE were born, aiming to split the RAN into different components and standardize the open interfaces that connect them.

Fundamentally, O-RAN leverages the concept of Software Defined RAN (SD-RAN) by decoupling the RAN data plane from the control plane and introducing several new RAN-controlling components. One of the central components is the near real-time RAN Intelligent Controller (nearRT-RIC), which manages the RAN (network slices, handovers, etc). The nearRT-RIC is designed to allow both the use of traditional, rule-based policies and Machine Learning or data-driven ones to optimize the RAN operation. The logic of these policies is encapsulated in applications called xApps that run on the nearRT-RIC platform and can read and modify different parameters of the RAN.

While providing opportunities for efficient resource management, the nearRT-RIC is also a prospective target for attackers, because of its control power over the RAN. Specifically, an attack vector is a malicious xApp that can interfere with other legitimate xApps running on the nearRT-RIC.  

NearRT-RIC implementations are still in their infancy and suffer from bugs and security vulnerabilities. These vulnerabilities are also prevalent in open-source implementations such as O-RAN Software Community's (OSC) RIC [1], where malicious xApps may disrupt the nearRT-RIC operation. The H Release of the OSC nearRT-RIC suffers from two major vulnerabilities that can compromise the operation of the RIC and crash it [2]. Additionally, a crafted packet sent by an xApp can crash memcpy and implicitly the whole OSC nearRT-RIC [3]. Such vulnerabilities significantly hinder the wide-scale adoption and deployment of O-RAN.

The goal of this student thesis is to reproduce the attacks discussed in [2] and [3] for the newer OSC nearRT-RIC I Release. Additionally, after reproducing the existing attacks and understanding the OSC RIC Platform, the student is expected to explore new attack attempts with the same goal of disrupting OSC nearRT-RIC. Special focus will be put on the critical components of the system, such as the Subscription Manager and Subscription Procedures, Routing Message Router, other xApps, and O1/A1/E2 Terminations.

[1] “O-RAN SC Projects,” https://docs.o-ran-sc.org/en/latest/projects.html#near-realtime-ran-intelligent-controller-ric , accessed: 2024-04-19.

[2] Hung, C.F., Chen, Y.R., Tseng, C.H., & Cheng, S.M. (2024). Security Threats to xApps Access Control and E2 Interface in O-RAN. IEEE Open Journal of the Communications Society, 5, 1197-1203.

[3] "Opening Critical Infrastructure: The Current State of Open RAN Security,” https://www.trendmicro.com/en us/research/23/l/the-current-state-of-open-ran-security.html , accessed: 2024-04-19.

- Experience with Docker and Kubernetes

- Linux Knowledge

- C/C++ Knowledge is a plus

- Razvan-Mihai Ursu ([email protected])

- Dominik Brunke ([email protected])

BA , FP : Dynamic Security Analysis in 5G RAN

Dynamic security analysis in 5g ran.

The mobile security sector has uncovered numerous vulnerabilities within link and session-establishment protocols. These vulnerabilities can be exploited using software-defined radios (SDRs) to interfere with, impersonate, or flood layer-3 (L3) messages, compromising security and privacy. These risks persist even within the latest 5G mobile network standard. With affordable SDRs and open-source cellular software stacks readily accessible, the economic and technical obstacles to practical cellular attacks are relatively minimal. In this work, we would like to investigate the resource depletion and Denial-of-Service (DoS) attacks, that are well known in LTE [1], within 5G RAN. The main focus will be regarding the RRC and NAS protocol vulnerabilities that are mentioned in [1]. The expected results would be to recreate these attacks experimentally in our 5G RAN with srsRAN [2]. If time allows, further tests can be performed over campus network with commercial 5G RAN.

[1] H. Kim, J. Lee, E. Lee and Y. Kim, "Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane," 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 1153-1168, doi: 10.1109/SP.2019.00038.

[2] I. Gomez-Miguelez et al., “Srslte: An open-source platform for lte evolution and experimentation,” in Proc. of ACM WiNTECH, 2016.

- C/C++ experience

- SDR experience is a plus

- 5G knowledge is a plus

- Serkut Ayvasik ([email protected])

- Nicolai Kroeger ([email protected])

SHK : Working Student for Analysis, Modeling and Simulation of Communication Networks SS2024

Working student for analysis, modeling and simulation of communication networks ss2024.

The primary responsibilities of a working student include assisting tutors in correcting programming assignments and answering questions in Moodle. Working time is 6-7 hours per week in the period from May to July.

  • Python knowledge

[email protected]

SHK : Student Assistent for Wireless Sensor Networks Lab Summer Semester 2024

Student assistent for wireless sensor networks lab summer semester 2024.

The Wireless Sensor Networks lab offers the opportunity to develop software solutions for the wireless sensor networking system, targeting innovative applications. For the next semester, a position is available to assist the participants in learning the programming environment and during the project development phase. The lab is planned to be held on-site every Tuesday 15:00 to 17:00.

  • Solid knowledge in Wireless Communication: PHY, MAC, and network layers.
  • Solid programming skills: C/C++.
  • Linux knowledge.
  • Experience with embedded systems and microcontroller programming knowledge is preferable.

[email protected]

[email protected]

SHK : Demo Implementation: Network Planning For The Future Railway Communications

Demo implementation: network planning for the future railway communications.

This works consists on the implementation of a demo for the work on Network Planning For The Future Railway Communications.

The idea is to program a web GUI, where the users can plan the network and examine its performance under dynamic scenarios.

An example of the expected outcome can be found here .

Please send your CV and transcript of records.

Basic knowledge on the following:

  • Web programming (GUI)

[email protected]

SHK : Development of a GUI for Monitoring and Debugging a Digital Twin of QKD Networks

Development of a gui for monitoring and debugging a digital twin of qkd networks.

We search for a student to build a GUI, simplifying analysis and interaction with the network emulator. The emulator is based on Containernet and includes QKD-specific network function virtualization. Currently, distributed routing is supported but will be extended by centralized routing. Monitoring data from active QKD-links are fed in to mirror realistic circumstances.

  • Build a front-end displaying performance and operational data
  • Build a GUI for dynamically changing secret key rates 
  • Programming skills in Python
  • Experience in front-end web development
  • Interest in security and practical concepts of guaranteed security

Mario Wenning [email protected]

MA , FP , SHK : Sustainable Core Networks in 5G with Performance Guarantees

Sustainable core networks in 5g with performance guarantees.

With the advent of 5G cellular networks, more stringent types of traffic, pertaining to applications like augmented reality, virtual reality, and online gaming, are being served nowadays. However, this comes with an increased energy consumption on both the user’s and network side, challenging this way the sustainability of cellular networks. Furthermore, the in-network computing aspect exacerbates things even further in that direction. 

Hence, it is very important to provide end-to-end sustainability, i.e., minimize the energy consumption in the network while maintaining performance guarantees, such as the maximum latency each flow should experience. This can be done, for example, depending on the traffic load in the network, and in order to keep the energy usage at low levels, the operator can decide to shut off certain network components, like User Plane Functions (UPFs) or edge clouds, and reassign the tasks to other entities. 

In this thesis, the focus will be on the core network. The aforementioned decisions will come up as solutions to optimization problems. To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver (e.g., Gurobi). The other part would be conducting realistic simulations and showing the improvements with our approach. 

- Basic understanding of 5G Core Networks and Mobile Edge Computing (MEC).

- Experience with mathematical formulation of optimization problems.

- Programming experience with Python and Gurobi.

BA , FP : Distributed Deep Learning for Video Analytics

Distributed deep learning for video analytics.

    In recent years, deep learning-based algorithms have demonstrated superior accuracy in video analysis tasks, and scaling up such models; i.e., designing and training larger models with more parameters, can improve their accuracy even more.

    On the other hand, due to strict latency requirements as well as privacy concerns, there is a tendency towards deploying video analysis tasks close to data sources; i.e., at the edge. However, compared to dedicated cloud infrastructures, edge devices (e.g., smartphones and IoT devices) as well as edge clouds are constrained in terms of compute, memory and storage resources, which consequently leads to a trade-off between response time and accuracy. 

    Considering video analysis tasks such as image classification and object detection as the application at the heart of this project, the goal is to evaluate different deep learning model distribution techniques for a scenario of interest.

BA , MA , FP : Edge AI in Adversarial Environment: A Simplistic Byzantine Scenario

Edge ai in adversarial environment: a simplistic byzantine scenario.

This project considers an environment consisting of several low performance machines which are connected together across a network. 

Edge AI has drawn the attention of both academia and industry as a way to bring intelligence to edge devices to enhance data privacy as well as latency. 

Prior works investigated on improving accuracy-latency trade-off of Edge AI by distributing a model into multiple available and idle machines. Building on top of those works, this project adds one more dimension: a scenario where $f$ out of $n$ contributing nodes are adversary. 

Therefore, for each data sample an adversary (1) may not provide an output (can also be considered as a faulty node.) or (2) may provide an arbitrary (i.e., randomly generated) output.

The goal is to evaluate robustness of different parallelism techniques in terms of achievable accuracy in presence of malicious contributors and/or faulty nodes.

Note that contrary to the mainstream existing literature, this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although robustness of the training phase can be considered as well, it has a much lower priority.

BA , MA , FP : On the Efficiency of Deep Learning Parallelism Schemes

On the efficiency of deep learning parallelism schemes.

Deep Learning models are becoming increasingly larger so that most of the state-of-the-art model architectures are either too big to be deployed on a single machine or cause performance issues such as undesired delays.

This is not only true for the largest models being deployed in high performance cloud infrastructures but also for smaller and more efficient models that are designed to have fewer parameters (and hence, lower accuracy) to be deployed on edge devices.

    That said, this project considers the second environment where there are multiple resource constrained machines connected through a network. 

    Continuing the research towards distributing deep learning models into multiple machines, the objective is to generate more efficient variants/submodels compared to existing deep learning parallelism algorithms.  

Note that this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although efficiency of the training phase can be considered as well, it has a much lower priority.

MA , FP : Optimizing Communication Efficiency of Deep Learning Parallelism Techniques in the Inference Phase

Optimizing communication efficiency of deep learning parallelism techniques in the inference phase.

Deep Learning models are becoming increasingly larger so that most of the state-of-the-art model architectures are either too big to be deployed on a single machine or cause performance issues such as undesired delays. 

That said, this project considers the second environment where there are multiple resource constrained machines connected through a network. 

When distributing deep learning models across multiple compute nodes, trying to realize parallelism, certain algorithms (e.g., Model Parallelism) are not able to achieve the desired performance in terms of latency, mainly due to (1) communication cost of intermediate tensors; and (2) inter-operator blocking.

This project consists of multiple sub-projects each can be taken separately.

In the context of Model Parallelism, two potential modifications can be considered: 

  • Pipeline parallelism by delaying the inference of the first few data samples assuming a live stream of input data.
  • Finding certain points in deep learning architectures or modifying the architecture itself so that for each data sample, it becomes possible to filter out some sub-parts of the model, and therefore reducing the transmitted data, and still achieve comparable accuracy.

Class and Variant Parallelism improve inter-node communication significantly. However, the input data needs to be shared between contributing nodes. The goal is to propose a technique to transmit less data, and to find a good trade-off between computation and communication.

MA , FP : Load Generation for Benchmarking Kubernetes Autoscaler

Load generation for benchmarking kubernetes autoscaler.

Kubernetes (K8s) has become the de facto standard for orchestrating containerized applications. K8s is an open-source framework which among many features, provides automated scaling and management of services. 

Considering a microservice-based architecture, where each application is composed of multiple independent services (usually each service provides a single functionality), K8s' Horizontal Pod Autoscaler (HPA) can be leveraged to dynamically change the number of  instances (also known as Pods) based on workload and incoming request pattern.

The main focus of this project is to benchmark the HPA behavior of a Kubernetes cluster running a microservice-based application having multiple services chained together. That means, there is a dependency between multiple services, and by sending a request to a certain service, other services might be called once or multiple times.

This project aims to generate incoming request load patterns that lead to an increase in either the operational cost of the Kubernetes cluster or response time of the requests. This potentially helps to identify corner cases of the algorithm and/or weak spots of the system; hence called adversarial benchmarking.

The applications can be selected from commonly used benchmarks such as DeathStarBench*. The objective is to investigate on the dependencies between services and how different sequences of incoming request patterns can affect each service as well as the whole system.

* https://github.com/delimitrou/DeathStarBench/blob/master/hotelReservation/README.md

SHK : Demo implementation: Multi-domain redundant network routing

Demo implementation: multi-domain redundant network routing.

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding entities which are instructed by the controller on how to forward traffic.

A network can be divided in multiple domains in order to ease its management or limit ownership. In multi-domain SDN, each domain has a controller which is responsible for the management. Controllers in different domains cooperate which each other aiming at providing multi-domain end-to-end connectivity.

In this work, the student will receive an abstract topology representing the multi-domain network. This information has to be used to build a virtual network, that can be used in the testing of different algorithms. The implementation should include a GUI, in order to visualize the topology and interact with the different elements in the network.

  • Networking/SDN
  • Object-Oriented Programming

[email protected]

Ongoing Thesis (already assigned)

Bachelor's theses, implementation and evaluation of a particle-based simulator for molecular communication with diffusion and flow, implement a particle-based simulation framework for molecular communication networks:.

Use e.g. Python or MATLAB

Main target scenario: cylindrical tube with multiple transmitters and receivers

Effects: Diffusion, laminar/uniform flow -> output: particle trajectories

Enable different types of transmitters and receivers (e.g. point, cross-sectional distribution, volume) Flexibility in placement of TX and RX and shape of the initial molecules distribution  

Implement and evaluate a non-orthogonal multiple access scheme based on the distance and the emitted number of molecules from each TX

Towards improving class parallelism for edge environments.

Main-stream serving paradigms for distributed models, such as data parallelism and model parallelism, are not suitable when it comes to inference for tasks that require low latency and have atomic input streams. A recent effort, Sensai, proposes a new generic approach called class parallelism that aims to distribute a base convolution neural network (CNN) model across several homogeneous machines.

    The model distribution paradigm decomposes a CNN into disconnected subnets, each responsible for predicting specific classes or groups of classes. They claim that this approach enables fast, in-parallel inference on live data with minimal communication overhead, significantly reducing inference latency on single data items without compromising accuracy.

    Class Parallelism, however, comes with its own set of challenges and limitations. For instance, since the generated models should be created in a homogeneous manner; they share similar characteristics. Further, regardless of the input, all sub-models have to be executed to get the final prediction, which directly impacts the robustness and scalability of the system.

    During the first stage of the thesis, our goal is to reproduce the results from the paper. Later, we want to improve the existing method to become more robust and possibly extend it to new use cases besides image classification. Finally, if time permits, we want to evaluate the trained models in an edge environment.

Investigation of Various Resource Allocation Granularities in the Frequency Domain of a 5G Radio Access Network

Resource efficiency is a key design principle for future 6G radio systems. To achieve resource efficiency, a high resource utilization must be accomplished. This can be realized by allocating exactly the number of resources to the various users, which are required by them. The number of required resources per user highly depends on the experienced channel conditions of a user, which can be determined by the Channel Quality Indicator (CQI) in the Downlink (DL). To determine the CQIs, reference signals are sent by the Base Station (BS) and the CQI is periodically reported by the User Equipemt (UE). CQI reporting can either be done for the entire Bandwidth Part (BWP), i.e., wideband CQI reporting, or for a subgroup of frequency resources, i.e., subband CQI reporting. In 5G Radio Access Networks (RANs), the unit of resource allocation in the frequency domain is a Resource Block Group (RBG), which consists of multiple Physical Resource Blocks (PRBs). The number of PRBs that make up a single RBG is fixed and depends on the employed Bandwidth Part (BWP) size [1]. Since the CQI determines how much data can be sent with a single RBG, it highly influences the number of required resources of a user. Hence, the accuracy and the granularity of the CQI in terms of the frequency spectrum impacts the overall resource utilization that can be achieved. Furthermore, the number of PRBs making up one RBG influences the achieved resource utilization, as the difference between the number of allocated resources and the number of required resources decreases with a decreasing level of granularity.   The goal of this thesis is to investigate the trade-off between a higher CQI reporting granularity, which comes with an increased signaling overhead, and the increased resource efficiency by achieving a better mapping between the actual channel conditions and the reported CQI value. Moreover, the impact of smaller RBG sizes should be compared against the increase in signaling overhead allowing for a more granular resource allocation. To this end, first, the student needs to gain a thorough understanding of the DL reference signals and CQI reporting in 5G as well as the DL resource allocation. This can be achieved by a detailed study of the ETSI 5G standards. Afterwards, the student is expected to conduct extensive simulations for different parameter settings to numerically evaluate the different trade-offs. Optionally, depending on the thesis progress, a similar analysis can be conducted for an UL setup or measurements can be conducted in a testbed setup that uses OpenAirInterface (OAI) [2].

[1] ETSI, “5G; NR; phyiscal layer procedures for data: 3GPP TS 38.214 version 17.5.0 release 17.” www.etsi.org, 2023. Technical Specification. [2] Open Air Interface, “OpenAirInterface | 5G software alliance for democratising wireless in- novation,” 2024. https://openairinterface.org [Accessed: January 31, 2024].

Improving network availability- adding links

This work aims to find the best links that, when added to the network, improve the network availability.

Communication Network Reliability course, Python, Integer Linear Programming

[email protected]

Development and justification of a physical layer model based on monitoring data for quantum key distribution

We search for a student to analyze the monitoring data of QKD devices deployed in a realistic environment. The monitoring data is already acquired and offers the possibility to investigate the relation between reported performance, vendor specifications, and the influence of the environment. The goal is to gain insights into performance prediction, eavesdropping detection and influences on security by applying data science, including AI/ML.

  • Experience in data science and statistics
  • Foundation in information theory
  • Willingness to analyze and understand imperfections of quantum transmission

Modeling and implementation of quantum entangled photon sources

What are the different models for quantum entangled photon sources and how can they be implemented in a quantum networks simulator?

Measurement Design and Performance Evaluation in srsRAN

Development of a performance test framework for srsRAN and evaluating the performance using this tool.

Data plane performance measurements

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding devices which are instructed by the controller on how to forward traffic.

P4 is a domain-specific programming language, which can be used to define the functionality of forwarding devices as virtual or hardware switches and SmartNICs.

This work consists on performing measurements for a given P4 code on different devices. For that, an small P4-enabled virtual network will be used to perform some measurments. Later, data will be also collected from hardware devices as switchs and SmartNICs. Measurement should be depicted in a GUI for its subsequent analysis.

  • Web programming (GUI).

Measuring the Throughput of quantized neural networks on P4 devices

Implement a quantized neural network in P4 and evaluate the throughput of feed-forward networks and networks with attention mechanisms on P4 hardware.

An SCTP Load Balancer for Kubernetes to aid RAN-Core Communication

Cloud Native deployments of the 5G Core network are gaining increasing interest and many providers are exploring these options. One of the key technologies that will be used to deploy these Networks, is Kubernetes (k8s). In 5G, NG Application Protocol (NGAP) is used for the gNB-AMF (RAN-Core) communication. NGAP uses SCTP as a Transport Layer protocol. In order to load balance traffic coming from the gNB towards a resilient cluster of AMF instances, a L4 load balancer needs to be deployed in the Kubernetes Cluster. The goal of this project is do develop a SCTP Load Balancer to be used in a 5G Core Network to aid the communication between the RAN and Core. The project will be developed using the language Go (https://golang.org/).

- General knowledge about Mobile Networks (RAN & Core). - Good knowledge of Cloud Orchestration tools like Kuberentes. - Strong programming skills. Knowledge of Go (https://golang.org/) is a plus.

[email protected]

Development of an East/West API for SD-RAN control communication

Software-Defined Radio Access Network (SD-RAN) is receiving a lot of attention in 5G networks, since it offers means for a more flexible and programmable mobile network architecture.

The heart of the SD-RAN architecture are the so called SD-RAN controllers. Currently, initial prototypes have been developed and used in commercial and academic testbeds. However, most of the solutions only contain a single SD-RAN controller. Nonetheless, a single controller becomes also a single point of failure for a system, not only due to potential controller failures but also due to a high load induced from the devices in the data plane.

To this end a multi-controller control plane often becomes a reasonable choice. However, a multi-controller control plane renders the communication among the controllers more challenging, since they need to often exchange control information with each other to keep an up to date network state. Unfortunately, currently there is no protocol available for such a communication.

The aim of this work is the development and implementation of an East/West API for SD-RAN controller communication according to 5G stardardization. The protocol should enable the exchange of infromation among the SD-RAN controllers regarding UEs, BSs, wireless channel state and allow for control plane migration among controllers.

  • Experience with programming languages Python/C++.
  • Experience with socket programming.
  • Knowledge about SDN is a must.
  • Knowledge about 4G/5G networks is a plus.

Master's Theses

Combined scheduling of psfp and tas.

Time Sensitive Networking (TSN) provides a variety of different mechanisms providing real-time communication. Especially, TSN is able to transmit periodic time-triggered traffic with strict real-time requirements. This thesis focuses on the time-aware shaper (TAS) standardized in IEEE 802.1Qbv and the per-stream filtering and policing (PSFP) mechanism defined in IEEE 802.1Qci. The goal is to develop an algorithm combining a TAS and a PSFP schedule. The TAS schedule should be secured by a time-based PSFP schedule. The PSFP schedule should drop frames or reduce their priority which are not matching the expected arrival interval. The algorithm has to be evaluated in a testbed considering traffic scenarios with multiple time-triggered streams.

VM Selection for Financial Exchanges in the Cloud

Financial exchanges consider a migration to the cloud for scalability, robustness, and cost-efficiency. Jasper presents a scalable and fair multicast solution for cloud-based exchanges, addressing the lack of cloud-native mechanisms for such.

To achieve this, Jasper employs an overlay multicast tree, leveraging clock synchronization, kernel-bypass techniques, and more. However, there are opportunities for enhancement by confronting the issue of inconsistent VM performance within identical instances. LemonDrop tackles this problem, detecting under-performing VMs in a cluster and selecting a subset of VMs optimized for a given application's latency needs. Yet, we believe that LemonDrop's approach of using time-expensive all-to-all latency measurements and an optimization routine for the framed Quadratic Assignment Problem (QAP) is overly complex. 

The proposed work aims to develop a simpler and scalable heuristic, that achieves reasonably good results within Jasper's time constraints. 

Towards Improving Model Generation in Variant Parallelism

Resource constraints of edge devices serve as a major bottleneck when deploying large AI models in edge computing scenarios. Not only are they difficult to fit into such small devices, but they are also quite slow in inference time, given today's need for rapid decision-making. One major technique developed to solve this issue is Variant Parallelism. In this ensemble-based deep-learning distribution method, different main model variants are created and deployed in separate machines, and their decisions are combined to produce the final output. 

    The method provides graceful degradation in the presence of faulty nodes or poor connectivity while achieving an accuracy similar to the base model.

    However, the technique used to generate variants can fail in scalability as combining variants of smaller size with somewhat identical characteristics may not help achieve a significant accuracy boost unless they are retrained with different random seeds. Therefore, this research will focus on improving variant parallelism by exploring other ways to generate variants. We will apply knowledge distillation (KD), where a teacher model of a certain type (e.g., ResNet-50) can be used to train a smaller student model or a model of a completely different structure (e.g., MobileNet). 

    We aim to develop a variant generation technique where we can generate as many variants as there are participating devices while boosting accuracy and inference speed. Additionally, we will create an optimization scenario that dynamically creates a smaller student model based on specific requirements, such as hardware characteristics and end-to-end performance metrics.

Possibilities of Localization Mechanisms in a 5G Lab Environment

Mobile networks have long provided mechanisms for localization. This capability has been improved with LTE and new features in 5G allow even better positioning.

While some positioning methods are hard to recreate in a lab environment (such as AoA), others are possible (e.g. E-CID). One goal is to identify which can be recreated on-site.

Additionally, not much is known about the prevalence of support for these localization mechanisms.

According to their documentation, the Amarisoft Callbox supports the NL1-Interface between an external LMF and the built-in AMF. This can be used for an early prototype.

Minimum goals:

·         Implement LMF that is able to interact with Amarisoft Callbox over NL1

·         Evaluate which localization methods are suitable for lab-based testing

·         Evaluate the prevalence of advertised localization mechanisms in commercial UEs

·         Evaluate the implementation status of localization mechanisms in commercial UEs

·         Evaluate if results can be explained by OS, Baseband or other factors

·         Find and evaluate possible attacks on the UEs location privacy

Extended goals:

·         Implement LPP into Open5GS with AmariRAN or Open5GS with OAI

·         Implement Demo into the 5GCube framework

Planning and Evaluation of Unbalanced and Balanced PON for Rural Areas

With the increasing need for broadband in rural areas and the shift towards fiber-based Passive Optical Networks (PON), this research will focus on the deployment strategies of Balanced PON (BPON) and Unbalanced PON (UPON). The aim is to enhance efficiency and minimize infrastructure costs associated with broadband deployment. Recognizing the high expense associated with fiber deployment, especially in rural areas where geographical and demographic factors pose significant challenges, this study will focus on a shift from the conventional BPON approach, characterized by uniform power splitting (e.g., 1:16 or 1:32 splitting), to a more adaptable UPON strategy. The UPON architecture facilitates variable power splitting ratios, enhancing network reach and optimizing the distribution of network resources—such as bandwidth and optical power—in rural areas, where the distances between Optical Network Units (ONUs) or customer premises are greater than those in urban settings.

The methodology includes gathering detailed rural area data from OpenStreetMap to simulate realistic network designs, including the strategic placement of Optical Line Terminals (OLTs), splitters, and Optical Network Units (ONUs). The research will compare the traditional BPON, both single and cascading splitting, against UPON in terms of fiber length utilization, network elements placement strategy, power distribution efficiency, and overall cost-effectiveness. By using Gabriel graphs to generate rural area networks and analyzing PON equipment parameters like transmitted power range, sensitivity, and fiber attenuation, this research will be dedicated to identifying the most efficient, unprotected, optical access network configurations for rural settings. The research will also consider the potential of merging BPON and UPON strategies, aiming to harness the combined benefits of both architectures for a more versatile and cost-effective rural broadband deployment.

This comparative analysis is expected to keen insights into the scalability of BPON and UPON solutions, guiding network operators toward more informed infrastructure development decisions in rural settings. By analyzing multiple Gabriel graphs to evaluate total fiber length, splitter requirements, and infrastructure cost, this research aims to derive comprehensive guidelines for efficient fiber deployment in rural areas. These guidelines will contribute to internet access deployment strategies and help narrow the digital divide, showcasing UPON as an affordable and practical solution for rural broadband. By aligning with initiatives like the Broadband Programs in Germany and Bavaria, this research underscores the global effort to extend high-quality internet connectivity to underserved areas. [1] This analysis will thus empower network operators with the knowledge to select the most appropriate PON configuration for rural deployments, ensuring efficient, reliable, and affordable broadband access.

References:

[1] "State aid: Commission approves German scheme for very high capacity broadband networks in Bavaria." The European Sting, 29 Nov. 2019, https://ec.europa.eu/commission/presscorner/detail/en/ip_19_6630.

Knowledge of:

  • Object Oriented Programming
  • Optical Networks

Electrical Network and Optical Network Dependability

The dependability that the electrical and optical networks have on each other is a critical factor in ensuring uninterrupted services to the large population of the landscape of urban infrastructure. This thesis aims to delve into the complexity of different protection schemes in optical networks and explore their interconnection with electrical networks through different kinds of failures. The motivation behind this thesis comes from the increasing reliance on digital and electrical services, making the importance of the robustness of the underlying infrastructure very critical. Additionally, the focus will be on urban areas due to their large number of population and complex infrastructural needs.

Protection schemes

Optical networks are backbone technologies that provide telecommunication services to urban areas and to safeguard these networks from failures and ensure continuity, different protection schemes are implemented.

  • Unprotected scheme: Basic configuration without any backup paths for the feeder fiber, leaving the network vulnerable to service disruptions.
  • Type A Protection (Feeder Fiber Protection): Incorporates a backup path for the feeder fiber's working path, enhancing reliability.
  • Type B Protection (Dual Parented): Each subscriber is connected to two Optical Line Terminals (OLTs) located in different geographical areas. This setup provides a secondary OLT as a backup, significantly reducing the risk of service interruption.
  • Type C Protection: Offers complete redundancy with two independent links extending to the subscriber's location, ensuring the highest level of network reliability.

The initial phase of this thesis involves mapping these protection schemes onto real-world urban layouts using OpenStreetMap data and Python scripting.

Failure Analysis and Impact Assessment

A critical aspect of network dependability is understanding how networks respond to failures and for this reason, this thesis implements different types of failures.  

  • Node Failure: Focuses on the failure of Optical Line Terminals (OLTs) and Remote Nodes (RNs), excluding Optical Network Units (ONUs) since their failure impacts are isolated.
  • Edge Failure: Involves simulating failures of all network connections (edges) to assess the extent of impact on ONUs.
  • Disaster Failure: Examines the effects of large-scale disasters, using a defined centroid and radius, to determine the number of affected ONUs within the disaster zone.

To explain the impacts on network functionality and ONUs, for each failure type the thesis will present visualizations and statistical analysis like boxplots or histograms. Interdependence with Electrical Networks Parallel to the exploration of optical networks, this thesis will study power network topologies, design constraints, and requirements necessary for integrating electrical network functionalities into the same urban layouts. Similar to the optical network, will simulate various power network failures and analyze their impacts on ONU connectivity. This approach aims to highlight and enhance the mutual dependability between electrical and optical networks, thereby increasing overall system robustness against failures.

All the work in this thesis is based on a combination of advanced scripting, data analysis libraries, and geospatial data sources to achieve its objectives. The primary tools and technologies used are Python, OpenStreetMap (OSM), and Python libraries. Some Python libraries are NetworkX which is used for creating and studying the structure of complex networks, and Pandas which is crucial for managing and analyzing the large datasets generated from OpenStreetMap and network simulations. Matplotlib and Seaborn to create static and interactive visualizations in Python.

Exploring Multi-Link Operation (MLO) for Reliable Transmissions in Wi-Fi 7 and Beyond

How to efficiently allocate industrial automation traffic to multiple links in MLO to meet the latency requirements?

  • Implementation of State-of-the-Art policies for our Industrial Automation Application using NS3.
  • Analyzing their effect and coming up with a novel policy/classification based on our traffic type.

A Novel Sparse dMIMO Transmission Scheme for Efficient Data Communication

For 6G radio systems it is key to achieve high capacity, coverage and energy efficiency. Distributed massive MIMO (dMIMO) systems are one of the often proposed 6G concepts to help to achieve these challenging requirements. dMIMO is very similar to a JT CoMP system, which has been researched for many years even so the reported performance gains over classical mMIMO systems are typically small to moderate. There are a number of well known challenges like the high inter cooperation area interference, channel aging for a high number of involved radio channels, or, huge processing complexity due to the large size of the channel matrices for a high number of cooperating transmission points. To overcome at least some of these issues a novel so called ‘sparse’ dMIMO system has been proposed, where the conventional transmission of user data is replaced by a novel ‘start stop bit’ transmission scheme. The main feature is the sparse resource usage for data transmissions, which is interesting for dMIMO systems as it can help to significantly reduce the inter cooperation area interference by potentially 98%. Similarly, the complexity for the dMIMO precoding might be reduced by potentially 98% as most of the resource elements of a physical resource block will be set to zero, i.e., do not need any precoding. The scope of the master thesis is to evaluate the novel 6G sparse dMIMO concept, verify the claimed benefits, identify new challenges and potential new implementation concepts overcoming these challenges. Where useful, AI/ML based solutions should be applied to achieve highest performance with lowest complexity.

Evaluation of Time Offset in 5G NR using USRPs

The 3GPP standard has established a maximum time synchronization error, the indoor 5G network may be able to handle a higher value proposed by an earlier simulation. To validate and determine such a result, it is necessary to use real hardware to create a small network and test related aspects of it. Upper error limits serve a useful purpose in many network applications. The developer is able to establish the maximum permissible error by the network requirements to aid in the construction of networks.

RTT-guided Route Servers at IXPs

Problem: BGP is performance-agnostic

Solution: incorporate a delay-related metric into the best-path selection process.

Approach: Estimate the round-trip prop_delay to destinations (/24s) within the routing table of the IXP

Goal: Evaluate if it is possible to outperform BGP’s route selection criterion, in terms of latency, with a measurement-based approach.

LFM Deep Dive: Understanding the Impact on 5G

Linkability of Failure Messages (LFM) is a security hole in the Authentication and Key Agreement (AKA) procedure.

The LFM flaw was first reported in 3G [2] and it has also been proven to work in 5G [1]. Compared to IMSI catchers, the use of the flaw for identifying nearby subscribers has two limitations: First, the attacker has to know the ID of a person of interest that they are looking for. Only these subscribers with known IDs can be detected, it is not possible to find the ID of a new subscriber without knowing / guessing it.

Second, LFM requires an attacker to probe every new device that connects to their fake base station for every ID that they are looking for. In addition to probing every new device, the attacker also needs to contact an authentic mobile network to obtain authentication requests for each person of interest.

Due to these limitations, the LFM flaw is less powerful than previously used IMSI catchers. The objective of this project is to examine the scalability and practicability of exploiting the flaw on a larger scale.

Network Programmability-based Security Mechanisms in Optical Access Networks

The advent of Software-Defined Networking (SDN) has revolutionized the way networks are managed and secured. In the context of optical access networks, where performance and security are paramount, it is crucial to develop advanced mechanisms for safeguarding against threats like TCP-SYN flood attacks. This research proposal aims to investigate a novel approach to thwarting such attacks, leveraging SDN controllers and programmable switches, specifically in optical access networks. How can SDN controllers and programmable switches be employed to effectively detect and mitigate TCP-SYN flood attacks in optical access networks, utilizing authentication using a modified SYN-ACK exchange and actuating triggers, while maintaining network performance and reliability? This research aims to contribute to the field of network security and SDN by providing a cutting-edge solution for mitigating TCP-SYN flood attacks in optical access networks. The expected outcomes include: 1. An innovative approach to SYN flood attack mitigation, leveraging SYN-ACK exchange and P4-based actuating triggers. 2. Insights into the performance and scalability of the proposed solution in optical access network scenarios. 3. A comprehensive evaluation of alternative SYN flood attack mitigation techniques, aiding network administrators in selecting the most appropriate method.

  • Machine Learning
  • Python and P4 programming
  • Knowledge of Softrware-Defined Networking

Exploration of Machine Learning for In-network Prediction and Classification

Software defined networks (SDN) have made data traffic routing a lot more convenient. The functionality of the additional controller can be used e.g. for detecting network threats like DoS or also for load balancing by redirecting data traffic. The initial idea of SDNs is that each time a new packet enters the network the packet is first forwarded to the controller to be checked. The controller then decides on which route the packet shall be send inside the network or tells the network to drop the packet, for instance if it is a threat. Each of the switches then save this information in their match-action tables. However, this model cannot scale in large networks with thousands or even millions of different packets trafficking, since that would lead to an additional latency, if every single packet needs to be sent to the controller.

Therefore, a promising solution to improve the model is to include a Machine Learning algorithm into the process. Specifically, Decision Trees (DT) and Random Forests (RF) can be used to do this line-rate classification. Since Decision Trees do not require complex mathematical operations, they can be easily deployed into the programmable switches using P4 language. Either a per-packet or a per-flow approach, each with its advantages and its drawbacks, will automate the decision of the switch of how to handle the incoming traffic instead of always forwarding it first to the controller.

In this master thesis a realisation of a DT into the P4 switches will be tested. First a functioning DT based on a real data traffic dataset will be implemented. Both variations (per-packet/per-flow) will be taken into consideration. The second step will be to translate the algorithm into the P4 switches. Afterwards the prediction performance will be analysed. The final step will be to compare the ML approach to the non-ML approach and draw conclusions on the results.

Performance Evaluation of a 6G UAM Connected Sensor Fusion System

The master thesis aims to develop a connected sensor fusion system focusing on its application in Urban Air Mobility localization. By gathering data from multiple sensors, the air vehicles (AVs) will be able to better estimate the airspace view and improve their route planning.  The performance of IoT protocols within the context of a 6G system will be assessed. The study also seeks to evaluate the impact of network performance factors, such as delay and packet loss, on the accuracy of the fusion data. Additionally, the thesis will investigate the impact of a semantic-aware transport layer on the performance of the fusion system. Ultimately, the research not only contributes to the advancement of UAM technology but also aligns with the emerging 6G paradigm, offering a more connected and efficient solution for tactical deconfliction in airspace navigation, making it safer and more reliable.

Remote Monitoring of Correlated Sources Over Random Access Channels in IoT Systems

The thesis studies a Markov model of two correlated sources (X and Y) transmitting the data over a wireless channel for remote estimation. The objective of the thesis is to develop a strong theoretical insight for modelling an estimator to optimize the errors and age of information in a wireless communication system. We aim at studying various estimation strategies to do so, and demonstrate the optimal method for the given conditions (such as correlation between the sources, and Markov model parameters). The implementation is carried out by simulating the abovementioned theoretical concepts in MATLAB under different conditions.

Analysis of UE-initiated Signaling Storms and Their Impact on 5G Network Security

Signaling storm is a specific type of DDoS attack, which emerges from frequent small-scale signaling activities of a group of compromised UE. Typically, signaling messages are exchanged between UE and the network for establishing communication sessions and managing network resources. However, signaling attacks abuse regular procedures to generate high number of signaling messages within a short period. The generation of excessive signaling load increases the network congestion and consumes resources. In 5G, UEs must send a request to initiate themselves and establish the communication with the 5G core. These initial registration request messages contain UE related information about identity, location and capabilities. The recent research internship focused on signaling storms has revealed that an initial registration request flood can generate significant signaling load and stress the network core. In the scope of mentioned internship, a simulation environment was created using UERANSIM and open5GS to investigate the impact of repetitive initial registration requests from a botnet comprising hundreds of UEs on control plane resources. The master thesis involves a comprehensive research study based on this initial observation to identify other signaling attack scenarios initiated by UEs, that abuse regular UE signaling for registration processes, inter-slice handovers and mobility handovers. Furthermore, assessing the impact of these scenarios and exploring possible detection methodologies are crucial for the intended study.

Motivation: 5G networks are designed to be used for three types of connected services: Enhanced Mobile Broadband(eMBB), Ultra Reliable Low Latency Communications (URLLC) and Massive Machine Type Communications (mMTC). Higher throughput, reliable connections and low latency capabilities of 5G networks should meet uninterrupted and robust data exchange requirements of users. Both the industry and individual users heavily rely on seamless connectivity. However, numerous studies have shown that 5G networks are vulnerable to signaling threats and DDoS attacks, which are becoming more severe due to the growing number of mobile and IoT devices. Such attacks can increase latency and impact service availability. The majority of literature on this topic examines potential 5G threats including signal storms and their effect on users. Even some detection and prevention techniques have been proposed. Although these studies provide valuable information about signaling storms, it has not been particularly investigated how control plane resources can be exploited by flooding UE initiated and 5G protocol specific requests. The research gap regarding concrete statements to reproduce signaling attacks is the main motivation of this study.

Objectives and Research Question: This work will focus on UE initiated DDoS attacks targeting control plane resources of 5G networks and it will question if these attacks can have a severe impact on practical 5G test setup. Therefore, signaling procedures particularly the ones involving NAS and NGAP protocols, will be explored to identify scenarios for UE initiated signaling attacks. The characteristics of the identified scenarios will be derived by theoretical analysis. The remaining objectives are reproducing these scenarios conducting experiments with appropriate simulation tools, evaluating the impact of these attacks on the network and user experience and investigating detection solutions for signaling storms.

Challenges: The identified scenarios should be demonstrated and analyzed to study the research question, which poses two main challenges. Designing a simulation environment for realistic attack reproduction is elaborate, which requires determining the most suitable solution to simulate UE, gNB and 5GC among existing solutions. The simulation environment cannot completely replace the real 5G network and there will be some restrictions. Therefore, the second challenge is to design experiments in a way that allows the derivation of general statements about 5G security threats from observations made during the experiments

Contribution: This thesis will address the signaling attacks on the control plane of 5G networks by identifying concrete signaling scenarios to generate excessive packet floods, analyzing them, and demonstrating them to assess their impact on the network. The simulation environment will allow reproducing various attacks to derive characteristics of the attacks, which are required for detection by distinguishing between good and malicious communication patterns. Overall, this work will contribute to the improvement of network security.

Proactive load-aware wireless resource allocation for sustainable 6G network

The rapid growth of traffic and the number of connected devices in the 5G and beyond wireless networks focus the attention on sustainability in the radio access network (RAN). Traffic load and status of available wireless resources in the network change rapidly, especially in scenarios with a large number of connections and high mobility. The high connectivity is caused by exponentially increasing Internet of Things (IoT) devices connected to the network for supporting various use cases ranging from Industry 4.0 to healthcare. IoT devices mainly powered by batteries are characterized by low cost, low complexity, and limited computational resources. Therefore, elongating their lifetime while fulfilling the quality of service (QoS) requirements poses a new research challenge. To tackle this problem, context awareness of devices consisting of device type and mobility; and the network traffic load simultaneously enhance the wireless resource management and the management of the devices states. Moreover, to enable awareness of the neighboring cells, the predicted information on the traffic load can be exchanged among cells. The above affects the decisions of accepting the device or offloading it to the neighboring cell and the device's operating state. In this thesis, the student will focus on developing and testing a context-aware resource allocation mechanism based on device mobility and traffic load, focusing on decreasing individual devices' energy consumption and reducing processing latency.

  • Good knowledge of Python and Matlab programming.
  • Good mathematical background.
  • Knowledge of mobile networks.

[email protected]

The Analysis of Dual Data Gathering Strategy for Internet-of-Things Devices in Status Update Systems

The analysis of a dual data-gathering strategy for Internet-of-Things (IoT) devices in status update systems offers valuable insights into improving the efficiency and reliability of data collection in IoT environments. This thesis focuses on investigating the dual data gathering strategy, aiming to optimize the performance of status update systems in IoT deployments. The dual data-gathering strategy takes advantage of both local and remote processing capabilities. Using different source servers, this strategy aims to reduce energy consumption and network congestion in status update systems. The anticipated outcomes of this research include a comprehensive understanding of the dual data gathering strategy, mathematical models to analyze its performance, and insights into its practical implementation. These outcomes will not only advance the theoretical understanding of status update systems in IoT but also have practical implications for the design and deployment of IoT networks and applications.

End-to-End Scheduling in Large-Scale Deterministic Networks

Providing Quality of Service (QoS) to emerging time-sensitive applications such as factory automation, telesurgery, and VR/AR applications is a challenging task [1]. Time Sensitive Networks (TSN) [2] and Deterministic Networks [3] were developed for such applications to guarantee ultra low latency, bounded latency and jitter, and zero congestion loss. The objective of this work is to develop a methodology to guarantee bounded End-to-End (E2E) latency and jitter in large-scale networks.

C++, Expeience with OMNET++, KNowledge of TSN.

Design and Evaluation of Protocol Exploits for the Vendor-Specific Implementation of Commercial 5G Devices

The goal of this thesis is to evaluate weaknesses of the protocol implementation in commercial smart phones and design attacks correspondingly.

Tow ards TSN and 5GS Integration: Implementation of TSN AF

Time-Sensitive Networking (TSN)is a set of standards[1]developedby IEEE 802.1 Task Groupto enableEthernet networks to giveQuality of Service (QoS)guarantees for time-sensitiveor mission-critical traffic and applications.VariousTSN standards provide differing QoSguaranteesand require different functions to be implemented in hardware. As devices frommultiplevendorsneedtooffermutuallycompatiblefunctions,profilessuchas IEEE60802forIndustrialAutomation[2]arebeingdefined.These profilesfocusona commonset of functions and configurations in order to decreasethe complexity which possible variations in standards might create.

REST API, Knowledge and Experience with 5G systems, Undesrstanding of TSN.

Processing Priorization in the Medical Context

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance. However, these processing resources are usually shared among many applications, which potentially leads to worse performance in terms of execution time, throughput, etc. . This is especially critical for applications such as autonomous driving, telemedicine or smart operations. Hence, the processing of more critical applications must be prioritized.

In this thesis, the task is to develop and evaluate a priorization approach for applications. However, not only technical aspects will play a role for the priorization, but also ethical, i.e. in this case medical aspects. This is especially important, if applications are equally critical. For this, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The priorization approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications.

The result will be an evaluated priorization approach for applications in the medical environment.

Motivation, basic networking knowledge, basic programming knowledge

[email protected]

Mobility Management for Computation-Intensive Tasks in Cellular Networks with SD-RAN

In the previous generations of cellular networks, both data plane and control plane operations were conducted jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and their adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane operations became possible in 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is shifted to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the cellular network because it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving this way network performance along multiple dimensions. Depending on the current spread of users (UEs) across BSs, and their channel conditions for which UEs periodically update their serving BSs, and BSs forward that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. Consequently, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. This comes into play even more with 6G networks in which in-network computing is envisioned to be integral part. Namely, users will be sending computationally-intensive tasks to edge clouds (through their BSs) and would be waiting some results as a response. However, as it will take some time until these tasks are run on the cloud, the user might be changing the serving BS. As a result, handover will have to be managed. However, while the task is being uploaded, performing handovers would not be good as then the task would need to be sent to another edge cloud. Consequently, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user while uploading the task and while downloading results.

In this thesis the goal would be to increase the overall network utility by deciding which tasks to serve (each task has its own utility), given the limited network resources in terms of the upload bandwidth, download bandwidth, storage in edge clouds, and finite computational capacity. Users besides sending tasks and receiving results are assumed to run other applications, with given service requirements. The student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other task would be to conductt realistic simulations and showing the advantages the developed algorithms offer against benchmarks.

Good knowledge of Python and interest to learn about mobility management in 5G

Enhanced Mobility Management in 5G Networks with SD-RAN

In pre-5G networks, both the data plane and control plane operations were performed jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and its adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane became possible 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is transferred to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the mobile network since it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving the network performance along several dimensions. To that end, depending on the current spread of the users (UEs) across BSs, and their channel conditions for which the UEs periodically update their serving BSs, and BSs send that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. As a consequence, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. In the previous generations of cellular networks, each BS has its own set of frequencies at which it could transmit. Given that each user would receive service by only one BS, depending on the channel conditions the users would have with the serving BS and the number of users within the same sell, the user would decide on whether she would need a handover or it would be better to remain within the same serving area (i.e., receiving service from the same BS) . Currently, conditional handovers are being the most serious candidate for 5G. However, every handover involves a considerable cost, due to the preparations that need to be performed to hand a user over from one BS to another one. These will unavoidably lead to reductions in data rates and network resources for other users. On the other hand, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user experiencing bad channel conditions. This of course depends on the topology of the users in that moment.

In this thesis, the focus will be on jointly deciding on the resource allocation policy for each user across the entire area of the controller and when to perform the handover in order to optimize different performance aspects (e.g., provide proportional fairness). To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other part would be conducting realistic simulations and showing the advantages the developed algorithms offer against state of the art.

Network Intrusion Detection using pre-trained tabular representation models

Network Intrusion Detection (NID) is a common topic in cybersecurity. However, it is not trivial to find a solution when facing the complicated network environment nowadays. Often a complex system is needed to process enormous volume of data stored in databases. This thesis proposes to use Deep Learning models to tackle the NID problem in a pre-train/fine-tune manner. As the new paradigm of transfer learning, the process of pre-training follows by fine-tuning has achieved huge success in many areas such as vision and NLP. We aim to study whether those trending models still perform well on large-scale structured data such as network security logs. It is plausible to leverage the strong learning ability of DL models to learn table representations and separate anomaly from benign records based on the learned information.

  • Machine learning knowdlege
  • Programming skills (Python, GIT)
  • Computer networking knowledge

Automated Generation of Adversarial Inputs for Data Center Networks

Today's Data Center (DC) networks are facing increasing demands and a plethora of requirements. Factors for this are the rise of Cloud Computing, Virtualization and emerging high data rate applications such as distributed Machine Learning frameworks. Many proposal for network designs and routing algorithms covering different operational goals and requirements have been proposed. This variety makes it hard for operators to choose the ``right'' solution. Recently, some works proposed that automatically generate adversarial input to networks or networking algorithms [1,2] to identify weak spots in order to get a better view of their performance and help operators' decision making. However, they focus on specific scenarios. The goal of this thesis is to develop or extend such mechanisms so that they can be applied a wider range of scenarios than previously. The thesis builds upon an existing flow-level simulator in C++ and initial algorithms that generate adversarial inputs for networking problems. [1] S. Lettner and A. Blenk, “Adversarial Network Algorithm Benchmarking,” in Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, Orlando FL USA, Dec. 2019, pp. 31–33, doi: 10.1145/3360468.3366779. [2] J. Zerwas et al., “NetBOA: Self-Driving Network Benchmarking,” in Proceedings of the 2019 Workshop on Network Meets AI & ML  - NetAI’19, Beijing, China, 2019, pp. 8–14, doi: 10.1145/3341216.3342207.

- Profound knowledge in C++

Towards Log Data-driven Fault Analysis in a Heterogeneous Content Provider Network

Bayerischer Rundfunk (BR) operates a network to deliver content via television, radio and the internet to its users. This requires a highly heterogenous network. The network monitoring solution for the BR-network collects log data from involved devices and stores it in a central database. Currently, human operators make network management decisions based on a manual review of this log data. This especially includes root cause identification in case of network failures. Such a human-centric process can be tedious and does not scale well with increasing network complexity. In this thesis, the student should perform a thourough analysis of the described data and evaluate the potential for automated processing. Goal is to provide a data-driven approach that significantly supports human operators with identifying root causes in case of network failures.

Reliability Analysis of ONOS Releases based onCode Metrics and SRGM

Software Defined Networking (SDN) separates the control and data planes.Control plane can be considered as the brain of the network and it is responsible for configuring flows, finding paths and managing all the network functionalities like firewall,  load balancing,  etc.  For this reason,  the SDN controller became complex.  Furthermore, it is a large software platform, which have many contributors  with  different  experience  level.   As  a  result  the  code  contains  many undetected and unresolved bugs.  If one of these bugs is activated in the operational state, it may cause performance degradation or even collapse of the whole system.

SDN serves to broad range of applications with different requirements.  Some of the application areas like autonomous driving requires high reliability and performance degradation may cause undesired results.  Software Reliability Growth Models (SRGM) are statistical frameworks that are based on historical bug reports  for  reliability  analysis  and  widely  used  to  estimate  the  reliability  of  a software.  Open network operating system (ONOS) is an open source project and it became one of the most popular SDN platforms.  Its historical bug reports are open in their JIRA issue tracker.  Currently ONOS has 23 releases, its first ten  versions  are  investigated  with  different  SRGM  models  [1]  and  found  that different SRGMs fit to the bug detection of different versions of ONOS.

Source code metrics refer to quantitative characteristics of the code.  Those metrics  can  describe  the  size  of  the  code  (lines  of  code),  complexity  of  code (McCabe’s complexity), etc.  They have been used to predicting the number of bugs, identifying possible potential location of bug, etc.

The goal of this work is to analyse the reliability of different ONOS releases. For that purpose, an understanding of the correlation between the structure of source code and the bug manifestation process is crucial to predict the future bug manifestation of the new releases.  First, a state of the art research on the SRGM will  be  done  to  understand  the  software  reliability  and  SRGMs.   Afterwards the  student  should  implement  different  SRGMs  to  fit  the  error  manifestation of  every  release  and  compare  the  results  with  mentioned  research  [1].   Then, different  code  metrics  will  be  obtained  from  each  ONOS  release.   Then,  the correlation between SRGM and code metrics will be revealed.  At last reliability of the release will be analyzed with the best fitting SRGM. The result of this work will be to propose a reliability metric combining SRGM and code metrics that improves the software reliability prediction.

P. Vizarreta, K. Trivedi, B. Helvik, P. Heegaard, W. Kellerer, and C. Mas Machuca, An empirical study of software reliability in SDN controllers,  13th International  Conference  on  Network  and  Service  Management  (CNSM), 2017.

Reinforcement Learning for joint/dynamic user and slice scheduling in RAN towards 5G

In the Radio Access Network (RAN), the MAC scheduler is largely inherited across generations in the past, to fit to new networking goals and service requirements. The rapid deployment of new 5G technologies will make upgrading of current ones extremely complicated and difficult to improve and maintain. Therefore, finding new solutions for efficient Radio Resource Scheduling (RRS) is necessary to meet the new KPI targets. 5G networks and beyond use the concept of network slicing by forging virtual instances (slices) of its physical infrastructure. A heterogeneous network requires a more optimized and dynamic RRS approach. In view of the development of SD-RAN controllers and artificial intelligence, new promising tools such as reinforcement learning can be proven useful for such a problem.

In this thesis, a data-driven MAC slice scheduler will be implemented, that maximizes user utility, while learning the optimal slice partitioning ratio. A deep reinforcement learning technique will be used to evaluate the radio resource scheduling and slicing in RAN. The results will be compared with traditional schedulers from the state-of-the-art.

vnf2tx: Automating VNF platform operation with Reinforcement Learning

Hierarchical sdn control for multi-domain tsn industrial networks.

In this thesis student will focus on designing and implementing a hierarchical SDN solution for industrial multi-domain TSN network.

[email protected]

Deliberate Load-Imbalancing in Data Center Networks

Recently, a scalable load balancing algorithm in the dataplane has been proposed that leverages P4 to estimate the utilization in the network and assign flows to the least utilized path. This approach can be interpreted as a form of Graham's List algorithm.

In this thesis, the student is tasked to investigate how a different online scheduling algorithm called IMBAL performs compared to HULA. A prototype of IMBAL should be implemented in NS3. The tasks of this thesis are:

  • Literature research and overview to online scheduling and traffic engineering in data center networks.
  • Design how IMBAL can be implemented in NS3.
  • Implementation of IMBAL in NS3.
  • Evaluation of the implementation in NS3 with production traffic traces and comparison to HULA (a HULA implementation is provided from the chair and its implementation not part of this thesis).

5G-RAN control plane modeling and Core network evaluation

Next generation mobile networks are envisioned to cope with heterogeneous applications with diverse requirements. To this end, 5G is paving the way towards more scalable and higher performing deployments. This leads to a revised architecture, where the majority of the functionalities are implemented as network functions, which could be scaled up/down depending on the application requirements. 

3GPP has already released the 5G architecture overview, however there exists no actual open source deployment of RAN functionalities. This will be crucial towards the evaluation of the Core network both in terms of scalability and performance. In this thesis, the student shall understand the 5G standardization, especially the control plane communication between the RAN and 5G Core. Further, an initial RAN function compatible with the 5G standards shall be implemented and evaluation of control plane performance will be carried out. 

  • Strong knowledge on programming languages Python, C++ or Java.
  • Knowledge about mobile networking is necessary.
  • Knowlegde about 4G/5G architecture is a plus.

Interdisciplinary Projects

Joint radio and computing resource allocation using artificial intelligence algorithms.

Mobile Edge Computing (MEC) enabled 6G network support low latency applications running in energy-constrained and computational limited devices, especially IoT devices. Using the task offloading concept, the devices offload the incoming tasks fully or partially to MEC depending on the device and network side's communication and computation resource availability.

The 6G networks are oriented towards the Digital Twins (DT); therefore, the resource allocation and offloading decisions are enhanced with the context-awareness of the devices, environment, and network. The device context awareness consists of battery state, power consumption, CPU load, and traffic type. Further, the environmental context-awareness includes the position of the network components, the mobility patterns, and the quality of the wireless channel and the availability of the network resources.

In this project, the student will focus on developing and testing an artificial intelligence algorithm for joint allocating of computing and radio resources in a predictive manner, focusing on decreasing individual devices' energy consumption and reducing processing latency.

  • Work with a 6G radio access network simulator, to generate the database for the scenario with devices having high energy efficiency and low task processing latency requirements.
  • Develop a reinforcement learning algorithm for joint allocation of radio and computing resource allocation.
  • Comparing the developed model with the state-of-the-art approaches.
  • Test and documentation.
  • Good knowledge of Python programming.
  • Good knowledge of deep learning/reinforcement learning.

Research Internships (Forschungspraxis)

Evaluation of time synchronization in nr ue-ue interference scenarios.

This research internship aims to assess the impact of time synchronization discrepancies between base stations located in different cells. When time offsets occur, transmissions from one cell may reach user equipment (UEs) in neighboring cells at unintended times, resulting in interference and potential performance degradation.

This research internship will set up a MATLAB simulation to evaluate this scenario.

  • Understanding of 5G systems.
  • Design of Experiments.
  • Experience with MATLAB.

Performance Evaluation of Serverless Frameworks

Serverless computing is a cloud computing paradigm that separates infrastructure management from software development and deployment. It offers advantages such as low development overhead, fine-grained unmanaged autoscaling, and reduced customer billing. From the cloud provider's perspective, serverless reduces operational costs through multi-tenant resource multiplexing and infrastructure heterogeneity.

    However, the serverless paradigm also comes with its challenges. First, a systematic methodology is needed to assess the performance of heterogeneous open-source serverless solutions. To our knowledge, existing surveys need a thorough comparison between these frameworks. Second, there are inherent challenges associated with the serverless architecture, specifically due to its short-lived and stateless nature.

Adapting reinforcement learning to the characteristics of quantum key distribution networks

The research internship aims to implement a reinforcement learning (RL) algorithm using Python to optimize routing agents in QKD networks. The literature showed different proof of concepts from other applications, and the research internship's objective is to adapt the best-suited one to the characteristics of QKD. 

- Background in AI/ML

- Experienced in Python

- Experienced in Statistics

Mario Wenning

[email protected]

Improving network availability- a min cut set approach

A cut set is a set of components that, by failing, causes the system to fail. A cut set is minimal if it cannot be reduced without losing its status as a cut set.

In this work, we aim to improve network availability based on the mincutsets. 

Communication Network Reliability course, Python, and Integer Linear Programming will be useful.

Investigating SDR-Based OpenRAN with LiFi Technology

This internship offers a comprehensive exploration of cutting-edge telecommunications technologies, focusing on the integration of Software-Defined Radios (SDRs) with Light Fidelity (LiFi) technology within the OpenRAN architecture.

MPTCP vs MPQUIC in a LiFi-WiFi Network

  • Review of related literature on multipath protocols
  • MPTCP+LiFi enabled hardware setup 
  • MPQUIC+LiFi enabled hardware setup 
  • Evaluate and Compare different schedulers on linux testbed
  • For a master thesis, this includes developing a novel scheduler

If you are interested in this work, please send an email with a short introduction of yourself along with your CV and grade transcript.

  • Experience with Linux networking
  • Strong foundation in wireless networking concepts
  • Availability to work in-presence

An AI Benchmarking Suite for Microservices-Based Applications

In the realm of AI applications, the deployment strategy significantly impacts performance metrics.

This research internship aims to investigate and benchmark AI applications in two predominant deployment configurations: monolithic and microservices-based, specifically within Kubernetes environments.

The central question revolves around understanding how these deployment strategies affect various performance metrics and determining the more efficient configuration. This inquiry is crucial as the deployment strategy plays a pivotal role in the operational efficiency of AI applications.

Currently, the field lacks a comprehensive benchmarking suite that evaluates AI applications from an end-to-end deployment perspective. Our approach includes the development of a benchmarking suite tailored for microservice-based AI applications.

This suite will capture metrics such as CPU/GPU/Memory utilization, interservice communication, end-to-end and per-service latency, and cache misses.

Evaluation of Time Synchronization in NR BS-BS Interference Scenarios

The research will utilize the 5G-NR functions available in Matlab for a two-base station scenario, each having multiple UEs connected in both cells. The throughput and block error rate of a UE at the edge of the cell will be evaluated for multiple simulations for different values of delayed transmission in the interfering base station. The study will also incorporate the other BS parameters, such as BS transmit power and the distance between the two BSs, and analyze their influence on the results obtained.

Evaluating a Reliability Block Diagram (RBD)

A reliability block diagram is a tool used to measure the availability of a system (a network, in our case). However, the existing tools as software packages do not work with bidirectional links. 

This work aims to build a tool that can evaluate the availability of a network based on the RBD.

Python and data structures, Kommunikationsnetze or Communication Network Reliability course would be useful. 

Sovereignty of an optical switch

An optical switch has multiple subcomponents. Usually, a switch manufacturer purchases raw materials from different subcomponent manufacturers.  When a network operator purchases switches from different switch manufacturers, there is a possibility that switches from different manufacturers share a common subcomponent. This becomes a vulnerable single point of failure. For example, in the case of laptops, an HP laptop and a Dell laptop can have the same AMD processor.

Our work is related to the trustworthiness of the subcomponent manufacturers. The goal is to evaluate:

a) The trustworthiness of a switch based on the subcomponent manufacturers

b) Provide guidelines to network operators to choose the most sovereign set of switches possible to avoid a single point of failure.

Implementation of a Medical Communication Protocol

The next generation of communication networks, namely 6G, will enable a huge variety of medical applications. In the current phase, our research focuses on optimizing the interaction between network and medical application developing. For this, we joined forces with the Minimally Invasive Interdisciplinary Therapeutical Intervention (MITI) group , sitting at the hospital "Rechts der Isar".

This research internship focuses on one certain use case, the mobile patient monitoring of patiens in the operation room. In particular, the vital parameters of the patient are continously measured and sent to a server. The task of the research internship is to develop and implement the communication protocol between the sensors and the processing server. Hereby, a basic implementation is already given. However, key components are still missing, which should be implemented and evaluated within the scope of this research internship.

Please note, that the real setup is located at MITI. You may have to work there.

  • Knowledge about Python and Linux
  • Basic communication (protocol) principles

Investigating the AWARE Framework for Automated Workload Autoscaling in Edge Environments

 The rapid growth of edge computing has introduced new challenges in managing and scaling workloads in distributed environments to maintain stable service performance while saving resources. To address this, this research internship aims to explore the feasibility and implications of extending the AWARE framework (Qiu et al., 2023) [1], which has been developed by as an automated workload autoscaling solution for production cloud systems, to edge environments. 

 AWARE utilizes tools such as reinforcement learning, meta-learning, and bootstrapping when scaling out workloads in the horizontal dimension by increasing the number of deployment instances and scaling up in the vertical dimension by increasing the allocated resources of a deployment instance. We will employ edge environment infrastructures with limited resources that run a lightweight distribution of the Kubernetes (K8s) container orchestration tool, and the goal is to gain insights into the performance, adaptability, and limitations of this approach.

Development and Evaluation of an Intelligent Wireless Resource Management for 5G/6G Downlink Channel

In this work, we will evaluate several additional techniques in 5G/6G toward reliability enhancements focusing on the Radio Access Network (RAN). The student is expected to first understand and evaluate the concept via simulations over MATLAB. Then, the techniques will be implemented in OpenAirInterface (OAI) [1] platform and we will evaluate the enhancements over our practical 5G testbed setup.

The initial setup will include a mobile robot, 5G Stand-alone communication, and a multi-access edge computing (MEC) system running a machine learning algorithm.

The expected outcome is to have improvements to the RAN of OAI including but not limited to wireless channel estimation and equalization, downlink reliability. More details will be provided after the first meeting.

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet, “OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, 2014.

- Good C/C++ experience

- Good Matlab knowledge

 - Medium knowledge on OFDM and Wireless Channel Estimation

- Good Python knowledge is a plus

- Machine Learning understanding is a plus

[email protected]

Further Development and Implementation of a System for Room Sensitive Measurement of Vital Parameters

As a new and future mobile communications standard, 6G is intended to focus on people. In addition to very low latencies and high data transmission rates, the network will be more reliable, secure and dynamic. These features are particularly in demand in medicine and medical device technology to develop intelligent value-added functions for patients and clinical staff. As part of the BMBF-funded joint project "6G-life", a demonstrator will be developed that uses and requires these network properties to enable new intelligent assistance functions.

The aim of this research practice is the further development of a system for the environment-aware measurement of vital parameters. For this purpose, a detailed literature research on the possibilities of biosignal processing and data transmission protocols in the medical field will be conducted. Subsequently, an already existing measurement setup is to be further developed, which records vital parameters by means of suitable sensors (ECG, temperature, SpO2, blood pressure, ...). A message architecture is to be designed that allows secure and controllable transmission of the sensor data to computing units located in the network for biosignal processing. The results of the signal processing are to be displayed on an already existing GUI.

This Research Internship is in cooperation with the MITI research group . Most work may be done at their site.

  • Motivation and independent working style
  • Knowledge in communication networks and signal processing
  • Knowledge in Python
  • Knowledge in C++ if possible

ILP-based network planning for the future railway communications

This work focuses on the exploration of networks enabling train control and on-board data communications under mobility scenarios. Today, low bandwidth networks such as GSM, providing less than 200 Kbps are being used to transmit train control information. Moreover, despite trains may use multiple on-board technologies to provide users with an internet connection (e.g., repeaters, access points), they fail in their attempt as these connections are characterized by having low throughput (less than 2 Mbps) and frequent service interruptions. This work aims at the development of a network planning solution enabling future applications in train mobility scenarios such as: Automatic Train Operation (ATO) [1,2], leveraging cloud technologies and meeting bandwidth requirements of data-hungry end-users' applications. Here, special attention will be given to the migration of communications services triggered by trains mobility patterns. It is expected of the student to find solutions to the following questions:

When to trigger service migrations?

Where to migrate services? (i.e., to which data center)

How to handle this process? (So that the user does not perceive any interruption)

Trains mobility patterns

Service requirements in terms of bandwidth and delay

Network topology

Data center locations

  The results from this work can be useful to get an insight on requirements for Smart Transportation Systems, that may in turn be useful for cementing the basis of other scenarios such as: Autonomous Driving and Tele-Operated Driving.

 [1] Digitale Schiene Deutschland. Last visit on 13.12.2021 https://digitale-schiene-deutschland.de/FRMCS-5G-Datenkommunikation [2] 5G-Rail FRMCS. Last visit on 13.12.2021 https://5grail.eu/frmcs/

Basic knowledge in:

Integer Linear Programming (ILP), heuristics or Machine Learning (ML).

Machine-learning-based network planning for the future railway communications

Evaluation of traffic model impact on a context-aware power consumption model of user equipment.

Energy efficiency is one of the key performance requirements in the 5G network to ensure user experience. A portion of devices, especially the Industrial Internet of Things (IIoT), run on limited energy, supported by the batteries not placed over the lifetime.

Therefore, the estimation of the power consumption and battery lifetime has recently received increased attention. Multiple context parameters, such as mobility and traffic arrivals, impact the device's power consumption.

In this thesis, the student shall focus on analysing the impact of different traffic models on the power consumption of user equipment. Different source and aggregated traffic models will be implemented depending on the number of devices n the scenario. The implemented traffic models will be evaluated based on a context-aware power consumption model for the user equipment.

  • Knowledge mobile networks.

Cost evaluation of a dynamic functional split

Increased interference is one of the main drawbacks of cell densification, which is an important strategy for 5G networks to achieve higher data rates. Function centralization has been proposed as a strategy to counter this problem, by letting the physical or scheduling functions coordinate among one another. Nevertheless, the capacity of the fronthaul network limits the feasibility of this strategy, as the throughput required to connect low level functions is very high. Fortunately, since not every function benefits in the same way from centralization, a more flexible approach can be used. Instead of centralizing all functions, only those providing the highest amount of interference mitigation can be centralized. In addition, the centralization level, or functional split, can be change during runtime according to the instantaneous network conditions. Nonetheless, it is not fully know how costly it is to deploy and operate a network implementing a dynamic functional split.

In this internship, the cost of a radio access network implementing a dynamic functional split will be evaluated. A simulator already developed at LKN will be used and extended to produce network configurations adapted to the instantaneous user position and activity. Then, off-the-shelf cost models will be improved and used to estimate the deployment and operating cost of the network under multiple scenarios. Furthermore, the conditions on which a dynamic functional split is profitable will be investigated. Improvements on the functional-split selection algorithm will be proposed, such that the operator benefits from enhanced performance without operating at exceedingly costly states. Finally, a model that takes into account the cost of finding and implementing a new functional split will be employed and its results compared to the previous results.

Jitter Analysis and Comparison of Jitter Algorithms

In electronics and telecommunication, jitter is a significant and an undesired factor. The effect of jitter on the signal depends on the nature of the jitter. It is important to sample jitter and noise sources when the clock frequency is especially prone to jitter or when one is debugging failure sources in the transmission of high speed serial signals. Managing jitter is of utmost importance and the methods of jitter decomposition have changed comparably over the past years.

In a system, jitter has many contributions and it is not an easy job to identify the contributors. It is difficult to get Random Jitter on a spectrogram. The waveforms are initially constant, but the 1/f noise and flicker noise cause a lot of disturbance when it comes to output measurement at particular frequencies in a system. 

The task is to understand the difference between the jitter calculations based on a step response estimation and the dual dirac model by comparing the jitter algorithms between the R&S oscilloscope and other competition oscilloscopes. Also to understand how well the jitter decomposition and identification is there.

The tasks in detail are as follows.

Setup a waveform simulation environment and extend to elaborate test cases

Run the generated waveforms through the algorithms

Analyze and compare the results:

Frequency domain

Statistically (histogram, etc)

Time domain

Consistency of the results

Evaluate the estimation of the BER (bit error rate)

Identify the limitations of the dual-dirac model

Compare dual-dirac model results with a calculation based on the step response estimation

Generate new waveforms based on the analysis

Summarize findings

Probabilistic Traffic Classification

The goal of this thesis is the classification of packet-level traces using Markov- and Hidden Markov Model. The scenario is open-world: Traffic of specific web applications should be distinguished from all possible web-pages (background traffic). In addition, several pages should be differentiated. Examples include: Google Maps, Youtube, Google Search, Facebook, Google Drive, Instagram, Amazon Store, Amazon Prime Video, etc.

Internships

Praktikantin planung, steuerungstechnik und produktionsnahe it, data analysis and prediction of optical network performance on open source data.

The Internship aims to analyze Open Source Optical Network Data for performance prediction of Optical Networks and develop data-driven methods for quality of transmission estimation.

[email protected]

Probability parameters of 5G RANs featuring dynamic functional split

The architecture of 5G radio access networks features the division of the base station (gNodeB) into a centralized unit (CU) and a distributed unit (DU). This division enables cost reduction and better user experience via enhanced interference mitigation. Recent research proposes the posibility to modify this functional split dynamically, that is, to lively change the functions that run on the CU and DU. This has interesting implications at the network operation.

In this topic, the student will employ a dedicated simulator developed by LKN to characterize the duration and transition rates of each functional split under multiple variables: population density, mitigation capabilities, mobility, etc. This characterization may be used then on traffic models to predict the network behavior.

MATLAB, some experience with mobile networks and simulators

Student Assistant Jobs

Working student for the medical testbed.

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

Most important:

  • Motivation and willingness to learn unknown things.
  • Ability to work with various partners (teamwork ability).

Of advantage:

  • C/C++ and knowledge about how other programming languages work (Python, etc.)
  • Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

Working Student for Analysis, Modeling and Simulation of Communication Networks SS2023

The main responsibilities of a working student include assistance to tutors in the correction of the programming assignments, as well as answering the questions in Moodle.  Working time is 6-7 hours per week in the period from May to July.

Working Student for Testbed on 5G/6G RAN

The results expected from this work are the enhancement of the 5G/6G tested setup with additional features on the Radio Access Network (RAN) and Core Network (CN). The work is focused on the OpenAirInterface (OAI) [1] platform, which forms the basis of the testbed setup. The expected outcome is to have improvements in wireless resource scheduling, focused on the uplink (UL), power management, and core network function management. 

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet, “OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, 2014.

  • Good C/C++ experience
  • Good Python knowledge
  • RAN and CN architecture understanding is a plus

[email protected][email protected]

Working Student for Network Delay Measurements

Communication Networks must fulfill a strict set of requirements in the Industrial Area. The Networks must fulfill strict latency and bandwidth requirements to allow trouble-free operation. Typically, the industry relies on purpose build solutions that can satisfy the requirements.

Recently, the industry is moving towards using Ethernet-based Networks for their use case. This enables us to use common of the shelf hardware to communicate within the network. However, this hardware still will execute industrial applications and therefore has the same strict requirements as the network. In this project, we consider Linux-based hosts that run the industrial applications. We consider different networking hardware and configurations of the system to see how it affects performance. The goal is to investigate the overhead of the host. 

Your tasks within the project are :

  • Measure the Host Latency with different NICs
  • Measure the Host Latency with different Hardware Offloads
  • Tune, configure, and measure the Linux Scheduler to improve performance

You will gain:

  • Experience with Networking Hardware
  • Experience with Hardware Measurements 
  • Experience with Test Automation

Please send a short intro of yourself with your CV and transcript of records to us. We are looking forward to meeting you.

  • Familiarity with Linux Console
  • C (not required, but a plus)

[email protected]

Solving the manufacturer assignment problem to maximise availability of a network using linear programming

Availability is the probability that a device performs its required function at a particular instant of time.

In most networks, the components are brought from different manufacturers. They have different availabilities. Network operators prefer having reliable components handling more traffic. This ensures the robustness of the network. So, assigning appropriate manufacturers to the components in the topology guaranteeing  a) maximum availability, and  b) load balancing on the nodes is essential.

For a fixed topology and known traffic, how can the components be assigned to manufacturers to maximise availability and balance load on nodes?

  • Communication Network Reliability course/ Optical Networks course at LKN
  • Knowledge of Linear Programming and/or nonlinear programming

Working Student for the Implementation of a Medical Testbed

  • Most important: Motivation and willingness to learn unknown things.
  • C/C++ and knowledge about how other programming languages work (Python, etc.) and/or the willingness to work oneself into such languages.
  • Preferred: Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.

Nicolai Kröger

End-to-End Delay Measurements of Linux End Hosts

As preliminary results show, Linux TCP/IP Networking Stack introduces a high networking delay. The topic of this work is to perform an empirical study on the Linux socket-based transmission approach and implement a delay measurement workflow based on existing foundations and repositories.

[1] Where has my time gone?

Basic knowledge of 

  • Networking and Linux

Implementation of a Techno-Economic tool for VLC

Future IoT will need wireless links with high data rates, low latency and reliable connectivity despite the limited radio spectrum. Connected lighting is an interesting infrastructure for IoT services because it enables visible light communication (VLC), i.e. a wireless communication using unlicensed light spectrum. This work will aim at developing a tool to perform an economic evaluation of the proposed solution in the particular case of a smart office.

For that purpose, the following tasks will have to be performed:

  • Definition of a high-level framework specifying the different modules that will be implemented as well as the required inputs and the expected outputs of the tool.
  • Development of a cost evaluation Excel-VBA tool. This tool will allow to evaluate different variations of the selected case study and if possible, to compare different alternative models (e.g., dimensioning) or scenarios (e.g., building types).

- Excel and VBA

Implementation of Energy-Aware Algorithms for Service Function Chain Placement

Network Function Virtualization (NFV) is becoming a promissing technology in modern networks. A challenging problem is determining the placement of Virtual Network Functions (VNFs). In this work, we plan to implement existing algorithms for embedding VNFs chains in NFV-enabled networks. 

Experience in Python or Java, object oriented programming

[email protected]

Working student for the PCN lab

Th e Prgrammable Communication Networks lab offers the opportunity to work with interesting and entertaining projects related to the Software-Defined Networking (SDN) and Programmable Data Planes (PDP) paradigms. For the next semester, a position is available to assist on the lab doing the student supervision during the lab sessions.

  • Solid knowledge in computer networking (TCP/IP, SDN, P4)
  • Solid knowledge of networking tools and Linux (iperf, ssh, etc)
  • Good programming skills: C/C++, Python

Please send your transcript of recrods and CV to: Cristian Bermudez Serna - [email protected]

Nicolai Kröger - [email protected]

External Thesis

Logotyp för Karlstads universitet, en sol

Thesis proposals on computer networking (DISCO)

Below you find open thesis proposals related to the research group DISCO (Distributed Systems and Communications) within Computer Science at Karlstad University.

bild på kablar.

The list of topics below is outdated and will be removed soon. You find currently open master thesis topics here .  

  • Application form  

Send your application form to  [email protected]

  • Master Thesis on Network Configuration with TimeCritical Networks AB
  • Performance evaluation of container runtimes for real-time application workloads in Kubernetes-based edge infrastructure
  • Congestion Control of WebRTC, video streaming over Wireless networks
  • Massive Multipathing
  • Browser Based Remote Control of Raspberry Pi enabled RC Car
  • HTTP3 in cluster networking (Red Hat)
  • Multipath Packet Scheduling for 5G Systems
  • The Great Journey - computer game studio  
  • Enhanced radio scheduling for eXtended Reality (XR) applications in 5G and beyond-5G networks (Ericsson)
  • Integrating cBPF into eBPF for packet matching (Red Hat)
  • Implementing a BPF NAT gateway (Red Hat)
  • Thesis proposal by Tieto Evry
  • Thesis in the area of Transport Protocols for 5G Networks
  • Machine Learning for Renewable Energy Management (Glava Energy Center)
  • Programmable Packet Scheduling in P4 (Ericsson)
  • Software Defined Networking Configuration Automation for TSN (Ericsson)
  • Thingsboard, Uddeholm
  • GOOSE and Smart Grid Control Signaling over 5G
  • CloudMAC on P4 Steroids
  • Statefull Layer 4 Load balancing with P4
  • Programmable Congestion Control with P4
  • Master's thesis within a research project
  • Optimized Rescheduling of Cloud-Native Network Functions in Telecom Cloud
  • 5G & Machine-to-Machine Communication
  • A study on scaling and load balancing for 5G core network using Kubernetes
  • Design and implementation of auto-scaling solution for 5G user plane functions  
Welcome to the on-line version of the UNC dissertation proposal collection. The purpose of this collection is to provide examples of proposals for those of you who are thinking of writing a proposal of your own. I hope that this on-line collection proves to be more difficult to misplace than the physical collection that periodically disappears. If you are preparing to write a proposal you should make a point of reading the excellent document The Path to the Ph.D., written by James Coggins. It includes advice about selecting a topic, preparing a proposal, taking your oral exam and finishing your dissertation. It also includes accounts by many people about the process that each of them went through to find a thesis topic. Adding to the Collection This collection of proposals becomes more useful with each new proposal that is added. If you have an accepted proposal, please help by including it in this collection. You may notice that the bulk of the proposals currently in this collection are in the area of computer graphics. This is an artifact of me knowing more computer graphics folks to pester for their proposals. Add your non-graphics proposal to the collection and help remedy this imbalance! There are only two requirements for a UNC proposal to be added to this collection. The first requirement is that your proposal must be completely approved by your committee. If we adhere to this, then each proposal in the collection serves as an example of a document that five faculty members have signed off on. The second requirement is that you supply, as best you can, exactly the document that your committee approved. While reading over my own proposal I winced at a few of the things that I had written. I resisted the temptation to change the document, however, because this collection should truely reflect what an accepted thesis proposal looks like. Note that there is no requirement that the author has finished his/her Ph.D. Several of the proposals in the collection were written by people who, as of this writing, are still working on their dissertation. This is fine! I encourage people to submit their proposals in any form they wish. Perhaps the most useful forms at the present are Postscript and HTML, but this may not always be so. Greg Coombe has generously provided LaTeX thesis style files , which, he says, conform to the 2004-2005 stlye requirements.
Many thanks to everyone who contributed to this collection!
Greg Coombe, "Incremental Construction of Surface Light Fields" in PDF . Karl Hillesland, "Image-Based Modelling Using Nonlinear Function Fitting on a Stream Architecture" in PDF . Martin Isenburg, "Compressing, Streaming, and Processing of Large Polygon Meshes" in PDF . Ajith Mascarenhas, "A Topological Framework for Visualizing Time-varying Volumetric Datasets" in PDF . Josh Steinhurst, "Practical Photon Mapping in Hardware" in PDF . Ronald Azuma, "Predictive Tracking for Head-Mounted Displays," in Postscript Mike Bajura, "Virtual Reality Meets Computer Vision," in Postscript David Ellsworth, "Polygon Rendering for Interactive Scientific Visualization on Multicomputers," in Postscript Richard Holloway, "A Systems-Engineering Study of the Registration Errors in a Virtual-Environment System for Cranio-Facial Surgery Planning," in Postscript Victoria Interrante, "Uses of Shading Techniques, Artistic Devices and Interaction to Improve the Visual Understanding of Multiple Interpenetrating Volume Data Sets," in Postscript Mark Mine, "Modeling From Within: A Proposal for the Investigation of Modeling Within the Immersive Environment" in Postscript Steve Molnar, "High-Speed Rendering using Scan-Line Image Composition," in Postscript Carl Mueller, " High-Performance Rendering via the Sort-First Architecture ," in Postscript Ulrich Neumann, "Direct Volume Rendering on Multicomputers," in Postscript Marc Olano, "Programmability in an Interactive Graphics Pipeline," in Postscript Krish Ponamgi, "Collision Detection for Interactive Environments and Simulations," in Postscript Russell Taylor, "Nanomanipulator Proposal," in Postscript Greg Turk, " Generating Textures on Arbitrary Surfaces ," in HTML and Postscript Terry Yoo, " Statistical Control of Nonlinear Diffusion ," in Postscript

Sciencing_Icons_Science SCIENCE

Sciencing_icons_biology biology, sciencing_icons_cells cells, sciencing_icons_molecular molecular, sciencing_icons_microorganisms microorganisms, sciencing_icons_genetics genetics, sciencing_icons_human body human body, sciencing_icons_ecology ecology, sciencing_icons_chemistry chemistry, sciencing_icons_atomic & molecular structure atomic & molecular structure, sciencing_icons_bonds bonds, sciencing_icons_reactions reactions, sciencing_icons_stoichiometry stoichiometry, sciencing_icons_solutions solutions, sciencing_icons_acids & bases acids & bases, sciencing_icons_thermodynamics thermodynamics, sciencing_icons_organic chemistry organic chemistry, sciencing_icons_physics physics, sciencing_icons_fundamentals-physics fundamentals, sciencing_icons_electronics electronics, sciencing_icons_waves waves, sciencing_icons_energy energy, sciencing_icons_fluid fluid, sciencing_icons_astronomy astronomy, sciencing_icons_geology geology, sciencing_icons_fundamentals-geology fundamentals, sciencing_icons_minerals & rocks minerals & rocks, sciencing_icons_earth scructure earth structure, sciencing_icons_fossils fossils, sciencing_icons_natural disasters natural disasters, sciencing_icons_nature nature, sciencing_icons_ecosystems ecosystems, sciencing_icons_environment environment, sciencing_icons_insects insects, sciencing_icons_plants & mushrooms plants & mushrooms, sciencing_icons_animals animals, sciencing_icons_math math, sciencing_icons_arithmetic arithmetic, sciencing_icons_addition & subtraction addition & subtraction, sciencing_icons_multiplication & division multiplication & division, sciencing_icons_decimals decimals, sciencing_icons_fractions fractions, sciencing_icons_conversions conversions, sciencing_icons_algebra algebra, sciencing_icons_working with units working with units, sciencing_icons_equations & expressions equations & expressions, sciencing_icons_ratios & proportions ratios & proportions, sciencing_icons_inequalities inequalities, sciencing_icons_exponents & logarithms exponents & logarithms, sciencing_icons_factorization factorization, sciencing_icons_functions functions, sciencing_icons_linear equations linear equations, sciencing_icons_graphs graphs, sciencing_icons_quadratics quadratics, sciencing_icons_polynomials polynomials, sciencing_icons_geometry geometry, sciencing_icons_fundamentals-geometry fundamentals, sciencing_icons_cartesian cartesian, sciencing_icons_circles circles, sciencing_icons_solids solids, sciencing_icons_trigonometry trigonometry, sciencing_icons_probability-statistics probability & statistics, sciencing_icons_mean-median-mode mean/median/mode, sciencing_icons_independent-dependent variables independent/dependent variables, sciencing_icons_deviation deviation, sciencing_icons_correlation correlation, sciencing_icons_sampling sampling, sciencing_icons_distributions distributions, sciencing_icons_probability probability, sciencing_icons_calculus calculus, sciencing_icons_differentiation-integration differentiation/integration, sciencing_icons_application application, sciencing_icons_projects projects, sciencing_icons_news news.

  • Share Tweet Email Print
  • Home ⋅
  • Science ⋅
  • Physics ⋅
  • Electricity and Magnetism: What Are They & Why Are They Important?

Topics for a Thesis in Computer Networking

Computer networking is a broad field with many potential research topics.

Specialties of the Right Side of the Brain

Computer networking is an engineering discipline dealing with the relationships between two or more computer systems or devices, whether through the Internet, an intranet, or an extranet. The study of computer networks involves both hardware and software issues, presenting you with several possible thesis topics.

A Robot Arm

The remote control of a robot arm is a common concern in networking literature. This concept has many applications, including military use, where it limits the number of humans put in harm's way on a battlefield, or for civil engineering, where the creation or upkeep of bridges and tunnels often requires the manipulation of inaccessible objects. The term "robot arm," though, has an important ambiguity. As Frank Lewis and two of his colleagues observed in 1999’s "Neural Network Control,” some tasks are appropriate for rigid-link arms, while others require flexible link systems.

Virtual Living Room

You could also explore the interaction between two human beings a great distance apart. Much of the attraction of chat rooms and other Internet phenomena is that they allow the sense of a "virtual living room," a meeting place for the minds of those who cannot meet in body. Yet room still exists for enhancing the reality of that virtual togetherness.

Sharing Entertainment

Networking may allow two people at a great distance not only to watch the same television program — and comment to one another about it — but also to ensure that their viewing is synchronized, so that Joe in Tulsa hears the character say "Hasta la vista, baby" at just the same moment that Sally in Tucson does. As entertainment becomes three-dimensional, that could go further. Joe might be on the left side of a fictional character saying those words, while Sally is on his right side. Joe may disclose to Sally subtleties in the developing action not yet obvious from her perspective.

Energy Consumption and Efficiency Issues

Your thesis could also address the energy consumption and efficiency issues that arise in computer networking. The contemporary Transmission Control Protocol leaves a lot of room for improvement in this area, especially with the increasingly heterogeneous nature of Internet use (on desktops, laptops, and handheld devices such as smartphones, for instance). Vassilios Tsaoussidis and Hussein Badr, instructors at Northwestern University and at State Universiyt of New York, respectively, said that "standard TCP versions lack the functionality to efficiently adjust their error-control strategies to distinct characteristics of network environments," raising efficiency issues that your thesis could address.

Related Articles

What is comparative biochemistry, what robots are used today, periscope facts for kids, the difference between craniology & phrenology, research topic ideas for biology, negative effects of bionics on society, what are main limitations of behavioral theories, uses of mirrors & lenses, what is a tactile sensation, making better humans — the marriage of man and machine, what are optical telescopes used for, biology speech topics, electrical engineering capstone project ideas, what is the importance of virtual reality to doctors..., mechanical barriers to communication, cheerleading science fair project ideas, what is spatial recognition, where to find the most up to date satellite pictures..., what are perceptual illusions.

  • "Neural Network Control of Robot Manipulators and Nonlinear Systems"; Frank L. Lewis et al.; 1999.
  • "The Rise of the Network Society"; Manuel Castells; 2010.
  • "TCP-Probing: Toward an Error Control Schema with Energy and Throughput Performance Gains"; Vassilios Tsaoussidis and Hussein Badr; 2000.

About the Author

Christopher Faille is a finance journalist who has been writing since 1986. He has written for HedgeWorld and The Federal Lawyer and is the author of books including "The Decline and Fall of the Supreme Court." Faille received his Juris Doctor from Western New England College.

Photo Credits

Comstock Images/Comstock/Getty Images

Find Your Next Great Science Fair Project! GO

  • 44-207-097-1871

Dissertation Writing Tools

  • 1. Complete Dissertation Writing Guide - eBook
  • 2. Dissertation Templates Pack
  • 3. Research Methodology Handbook
  • 4. Academic Writing Checklist
  • 5. Citation Style Guide
  • 6. Time Management for Dissertation Writing
  • 7. Literature Review Toolkit
  • 8. Grammar and Style Guide
  • 9. Dissertation Proposal Template
  • 10.Five Pre-written Full Dissertation Papers

networking thesis proposal

Best 59 Networking Dissertation Topics Ideas & Examples

The Most Conclusive Networking Dissertation Topics That Will Help Students in writing their Final Year Dissertations In recent years, Networking has grown by leaps and bounds. However, students still find it difficult to select an appropriate topic for their networking dissertation If you are amongst those students who are facing difficulty in the selection of a […]

Networking Dissertation Topics

Table of Contents

The Most Conclusive Networking Dissertation Topics That Will Help Students in writing their Final Year Dissertations

In recent years, Networking has grown by leaps and bounds.

Networking is a complicated term.  It has evolved over the years after the advent of the computer. In information technology, networking is the construction, design, and use of a network, including the physical (cabling, hub, bridge, switch, router, and so on), the selection and use of telecommunication protocol and computer software for using and managing the network, and the establishment of operation policies and procedures related to the network. The basic purpose of networking is the sharing of information and is based on a reliable and fast communication network.

Importance of Networking

Inevitably,  networking has taken the center stage  in the world. The different kinds of networking systems i.e.  local area networking , working in a particular locality within a radius of a few kilometers; metropolitan area networking , working in a large city; and  wide area networking , covering thousands of kilometers in the radius are in place. No one can live without it, for everything is now interconnected and dependent on one another. Hence any failure in communication can lead to a massive disorder.

Networking Dissertation Topics Ideas

This importance of  networking gives a good prospect to any student who specializes in networking . Networking dissertation then becomes inevitable for them. However, there starts the confusion as to which topic should be selected. Nonetheless, in the topic selection for the dissertation, students must prefer the current requirement of networking. They may take general topics as well as social networking dissertation topics.

This not only helps them to create their interest in the dissertation but also helps the world community to protect vulnerable networking issues. Some of the important and appealing/interesting networking dissertation topics are listed below.

  • The impact of 5G technology on mobile networks
  • The use of software-defined networking in data centers
  • The security of IoT networks
  • The use of network virtualization in cloud computing
  • The impact of edge computing on network architecture
  • The use of network function virtualization in telecommunications
  • The security of industrial control systems networks
  • The use of network slicing in 5G networks
  • The impact of artificial intelligence on network management
  • The use of network-as-a-service in cloud computing
  • The security of wireless networks
  • The use of network coding in wireless networks
  • The impact of network traffic on network performance
  • The use of network-on-chip in embedded systems
  • The security of software-defined networks
  • The use of network function chaining in 5G networks
  • The impact of blockchain technology on network security
  • The use of network orchestration in 5G networks
  • The security of mesh networks
  • The use of network-attached storage in cloud computing
  • The impact of quantum computing on network security
  • The use of network-as-a-platform in cloud computing
  • The security of mobile ad-hoc networks
  • The use of network-on-demand in cloud computing
  • The impact of AI-based network optimization and automation on network performance.
  • The importance of networking in the current era
  • The history of the wireless networks
  • The future prospect of the wireless networks
  • How has networking become inevitable in present times?
  • Analyzing the rapid increase in the market for the wireless networking
  • Comparing wireless and wire-based networks – which one is more important
  • Giving an overview of the terms, technology, and legal issues in the wireless networking
  • How is networking important in an institution
  • An overall categorization of networking systems
  • The different aspects of networking: pros and cons
  • The newly arising security issues in the networking
  • The new technical aspects which allow people to communicate with machines
  • The inflow of different social networks
  • How to improve the security of networks i.e. protection of intellectual property rights etc
  • Design a secure scheme for data transmission in opportunistic routing in wireless sensor networks
  • The novel method for congestion avoidance in mobile ad hoc networks to maintain quality of service in the network ‘
  • Comparing three wireless networking types i.e. LAN, WAN, and MAN
  • The importance of wireless networks in mobile communications
  • The fundamental working of broadband and Bluetooth technologies
  • The world economy and the input of networking
  • The importance of networking in the internet industry
  • How are the security issues affecting the banking industry?
  • Networking – indispensable for the marketing
  • The growth of media and the networking
  • Online competitions
  • The new conferencing trends i.e. video conferencing
  • The different concepts of network management

Other related posts

  • IT Dissertation Topics
  • Computer science dissertation topics
  • Information systems dissertation topics

Custom Topics Brief Service from experts

These are the best networking dissertation topics if you are still searching for some unique dissertation topics on networking fill out the form below and get we customize dissertation topic brief service from our experts.

Paid Topic Mini Proposal (500 Words)

You will get the topics first and then the mini proposal which includes:

  • An explanation why we choose this topic.
  • 2-3 research questions.
  • Key literature resources identification.
  • Suitable methodology including raw sample size and data collection method
  • View a Sample of Service

Note: After submiting your order please must check your email [inbox/spam] folders for order confirmation and login details.If email goes in spam please mark not as spam to avoid any communication gap between us.

Get An Expert Dissertation Writing Help To Achieve Good Grades

By placing an order with us, you can get;

  • Writer consultation before payment to ensure your work is in safe hands.
  • Free topic if you don't have one
  • Draft submissions to check the quality of the work as per supervisor's feedback
  • Free revisions
  • Complete privacy
  • Plagiarism Free work
  • Guaranteed 2:1 (With help of your supervisor's feedback)
  • 2 Instalments plan
  • Special discounts

Other Related Posts

  • Artificial Intelligence Dissertation Topics – AI February 20, 2024 -->
  • Data Science Dissertation Topics February 20, 2024 -->
  • Civil Engineering Dissertation Topics Research Ideas February 20, 2024 -->
  • Dissertation Topics in International Relations February 20, 2024 -->
  • Unlock Your Academic Potential with the Right Topics for Dissertation October 12, 2023 -->
  • 89+ Best Unique and Informative Speech Topics for Students January 6, 2023 -->
  • Employment Law Dissertation Topics January 4, 2023 -->
  • 59 Best Environmental Law Dissertation Topics & Examples January 4, 2023 -->
  • 37 Monetary economics dissertation topics ideas March 20, 2022 -->
  • 39 Economic geography dissertation topics examples March 19, 2022 -->
  • 37 Public economics dissertation topics Ideas March 18, 2022 -->
  • 39 Financial Economics Dissertation Topics Ideas March 17, 2022 -->
  • 39 Experimental economics dissertation topics Ideas March 16, 2022 -->
  • 39 Environmental Economics Dissertation Topics Ideas and Samples March 15, 2022 -->
  • 39 Health economics dissertation topics Ideas and Examples March 14, 2022 -->

Topic brief help

WhatsApp and Get 35% off promo code now!

M.Tech/Ph.D Thesis Help in Chandigarh | Thesis Guidance in Chandigarh

networking thesis proposal

[email protected]

networking thesis proposal

+91-9465330425

networking thesis proposal

Thesis and Research Topics in Computer Networking

Students who find programming complex and challenging mostly go for networking field in computer science engineering. But even after indulging in this field they are often confused about which topic to choose for the project or for an M.Tech thesis. Here is the list of some of the good topics in computer networking with a basic introduction which you can choose for your project or thesis. You can also get thesis help and thesis guidance on these topics from experts. In the infographic below you will find the list of latest thesis and research topics in computer networking .

List of the best thesis topics in networking:

Wireless Sensor Networks

Wireless Ad hoc Network

Vehicular Ad hoc Networks

Network Security

  • Evaluate and implement energy efficient protocol for data aggregation in wireless sensor networks
  • Node Localization Approach in underwater acoustic network using bio-inspired method
  • Evaluate and implement sink hole attack isolation method in wireless sensor networks
  • The three level hierarchical routing protocol for data aggregation in wireless sensor networks
  • Design and implement black hole attack isolation method in wireless sensor networks
  • The clock synchronization method in wireless sensor network for the efficient data transmission method
  • The efficient channel sensing scheme for wireless body area network
  • Design secure scheme for data transmission in opportunistic routing in wireless sensor networks
  • The misdirection attack isolation scheme in multilevel   hierarchical  routing protocol in WSN
  • To propose fault tolerance scheme for wireless sensor networks
  • To propose novel approach to maintain quality of service in the network for link failure
  • To propose hybrid routing protocol based on the bio-inspired methods in mobile ad hoc network
  • The threshold based mechanism for the isolation of worm hole attack in mobile ad hoc networks
  • Evaluate and implement clustering based method for the isolation of black hole attack in mobile ad hoc network
  • The novel method for the congestion avoidance in mobile ad hoc network to maintain quality of service in the network ‘
  • The multicasting scheme for the path establishment in mobile ad hoc networks
  • Implement and evaluate Sybil attack isolation scheme for vehicular ad hoc networks ‘
  • To propose novel scheme for the detection of DDOS attack in vehicular ad hoc networks
  • The zonal based routing scheme for path establishment in vehicular ad hoc networks
  • The secure and efficient message authentication scheme for vehicular ad hoc networks
  • The location based routing scheme for path establishment in vehicular ad hoc networks
  • The tree based multicasting scheme in vehicular ad hoc network for data transmission

TCP/IP Protocol

Now our systems computer, laptop, mobiles, and other internet devices are connected to one node to communicate with each other and to get internet access, and this whole process called a network system. They all are connected with the physical medium so that’s why they can be guided as wireless network system or copper wire network system to provide calculated data speed in the notes time frame. It spreads motions as electromagnetic waves or light pulses. The direct connection between two nodes are considered as guided medium and is more reliable and the occurrence of error has very less as compared to another medium. Un-guided medium is used in so many systems to provide multiple outputs at the same time. But in this system error rate is high.

To send or receive the internet signal, the two nodes follow a set of protocol which is known as IP (internet protocol). Each system is designed to follow this set of rules itself to generate maximum speed with a time limit. These protocols are designed in a manner that they follow these rules one by one. Each layer follows the protocol of the upper layer to provide services and then that layer follows the upper layer, this process will continue until data is transmitted or received. Lower layer always follows the basic set of rules and upper layer follows the advanced set of rules. Service provided by both layer will be different in terms of protocol instructions.

First data is sent or received in the application layer and then in the transport layer, after following the set of rules data then is sent to network layer to link layer and after that data has been sent to physical layer to the user. Data is divided into small packet format to provide consistency. Common internet protocol is RTP (Real-time Transport Protocol). which is used to provide information at the time of gaming, movie or music streaming. first two-layer are used to transmit or receive the information in small data packets.

Two main internet protocols are UDP (user datagram protocol) and TCP (transport control protocol). UDP and TCP both have their advantages and disadvantages of use. UDP is used because of their simplicity and with the use of UDP data can be sent immediately. But at the same time, it is unreliable as compared to TCP. TCP, then again, directs the sending rate concerning the client’s ability – stream control – and with respect to the limit of the system – clog control. It conveys the information altogether and guarantees that all information achieve the beneficiary. The hidden layers, similar to the system layer, are not required to perform solid conveyance.

TCP(Transmission Control Protocol) is a set of rules to access the Internet with the interconnection of various Internet-based devices. We can say it is a communication protocol in which there is a host with access to the Internet. This is a good topic for an M.Tech thesis in networking. If you are planning to choose this networking topic for research, then here is some basic introduction to this.

TCP/IP provides end to end data transmission between devices along with some other functionalities like addressing, mapping and acknowledgment. TCP/IP is a combination of two protocols. TCP controls the messages by dividing them into packets. IP controls the transmission of these packets from the sender to the receiver.

TCP/IP protocol layers

Following are the four layers of TCP/IP:

Application layer

Transport layer

Internet layer

Physical layer

Working of TCP/IP protocol

Client/Server model is used as a mode of communication by TCP/IP. It works in the following way:

Application layer consists of various applications for data exchange with use of protocols like HTTP(Hypertext Transfer Protocol), FTP(File Transfer Protocol), SMTP(Simple Mail Transfer Protocol)

The transport layer provides end-to-end communication between the host and the user. It uses protocol UDP(User Datagram Protocol).

Internet layer is responsible for the transfer of packets over the network and uses IP(Internet Protocol) for this purpose.

The physical layer provides interconnection between the nodes.

Advantages of TCP/IP protocol

It can be easily modified.

It is compatible with all the operating systems.

It is scalable in determining the most appropriate path.

Thus it is a good topic for M.Tech thesis as well as for research. A student can get thesis help on this topic from experts specialized in thesis guidance. You can also explore the Internet for further details on this topic.

Network Simulation Tools

Here is the list of commonly used network simulators having different features:

Another good computer networking topic for an M.Tech thesis is NS2 . NS stands for Network Simulator. It is an open-source, discrete-event based network simulator mainly used for research purpose and for teaching. It provides help in simulating routing protocols like IP, TCP, UDP, etc. It creates a simulation environment for studying the network. Following steps are followed while creating a simulation environment:

Topology Definition

Development of the model

The configuration of the link

Analysis of the problem

Visualization

NS2 create network topologies and then examines the behavior of the network under any event. The behavior is analyzed by tracing down the events. NS2 provides text-based as well as animation-based simulations.

Advantages of NS2

It has the ability to support multiple protocols.

It can represent network traffic graphically.

It can also support multiple algorithms for routing and queuing.

NS2 is a very good topic for an M.Tech thesis in the computer networking field. You will not only get theoretical knowledge but also practical experience of network simulator tool. You can get thesis guidance about NS2 from an expert who has practical knowledge about how to use this tool.

MANET stands for mobile ad hoc Network and is another good choice for an M.Tech thesis topic in networking. In MANET, the nodes are self-configurable and have the ability to move freely in any direction and can link with other devices frequently. MANET was originally used as a military project in defense. MANET have the challenges of weak signal strength, reliability, power consumption along with some other problems.

Characteristics of MANET

Each node is independent in nature i.e. each node act as the host as well as the router.

It is based on the distributed nature of operation for security and configuration.

The network is dynamic in nature i.e each node can join and exit the network at any time.

The nodes in the network are associated with less memory and power.

In MANET, the bandwidth remains fluctuating.

MANET creates a symmetric environment such that all the nodes have identical features like responsibilities and capabilities.

Hurdles in the path of MANET

There are certain hurdles in the path of MANET, which it has to overcome. Some of these are:

The reliability of the transmission is affected by certain factors like data loss, interference, and blockage.

The rate of transmission is limited to a certain range thus there is a reduced data rate.

Packet loss can occur while transmission of data.

Frequent path breaks.

Lack of firewall results in security issues in the network.

This was just the introduction to MANET to give an overview of what it is if you are going with this topic for your M.Tech thesis.

Network Security is the set of rules to ensure the safety of the network of an organization or personal network. You can choose this topic for your M.Tech thesis if you have a complete understanding of how the data is transferred over the network. Network Security also include security of physical hardware devices. Network Security in software means providing authorized access to the network by means of ids and passwords.

Whenever a user tries to access the network, his authenticity is checked by means of ids and passwords. This is done to prevent any malicious user from entering the network by the motive of hacking it.

Types of attacks to network

Active Attack – In this type of attack, a hacker tries to make changes to data while it is being sent from one node to another.

Passive Attack – In this type of attack, an outsider monitors system of the organization consistently to find vulnerable ports.

Network Security Tools

Following are some of the tools employed in network security:

Thus if you really have significant knowledge(practical + theoretical) of networking tools, security

measures then you should choose this topic for M.Tech thesis. Besides, you will get thesis help as well as guidance on this topic from computer networking experts.

Network Topologies

Network Topology is the arrangement of nodes in the network both physical and logical. It is an easy topic for M.Tech thesis. Following are some of the common physical topologies:

Bus – In the bus topology, each node is connected to the main cable known as bus such that every node is directly connected to every other node.

Star – In the star topology, each node is connected to a central hub such that all the nodes are indirectly connected to each other.

Ring – In this topology, the nodes form a closed loop such that the adjacent nodes are in direct connection with each other.

Token Ring – In the token ring topology, a protocol is used. A token is passed from one node to another. A node that wants to transfer data should acquire the token.

Mesh – In the mesh network, each node is directly connected to every other node. It can be a full mesh or partial mesh network.

Tree – It is the interconnection of bus topology and star topology.

Daisy Chain – In this topology, each node is connected to two other nodes but do not form a closed loop like ring topology.

Hybrid – It is a combination of two or more topologies.

If you are afraid of complex topics in networking for M.Tech thesis, then this topic is for. It is relatively simple to understand and work on. Just go for it.

It is another major topic in computer networking and also a good choice for a thesis or project. Ipv4 is the fourth version of Internet protocol while Ipv6 is the sixth version of Internet protocol.

Characteristics of IPv4

It uses a 32-bit address.

The address is written in decimal separated by dots.

The header includes a checksum.

Broadcast addresses are used to send data packets to other nodes.

In this the Internet Protocol Security is optional.

Characteristics of Ipv6

It uses a 128-bit address.

The address is written in hexadecimal separated by colons.

The header does not include a checksum.

Broadcast addresses are not used to send data packets.

The Internet Security Protocol is compulsory.

It is a good area to study how data transfer takes place over the internet. You will study the IP data packets of Ipv4 and Ipv6. You can select this as your M.Tech thesis topic.

OSI stands for open system interconnection. It is another good topic for an M.Tech thesis in the computer networking field. It provides a networking framework to implement protocols in layers. There are seven layers of OSI Model:

Physical Layer – This layer is responsible for transferring digital data from the source to the destination.

Data Link Layer – This layer checks error in data along with the MAC address. It turns bits into data frames.

Network Layer – This layer checks whether the data has reached the destination or not by examining the source and the destination address.

Transport Layer – This layer transfers data over the network by using the TCP protocol.

Session Layer – This layer manages the events and keeps them in sequence. It supports multiple types of connections.

Presentation Layer – It looks after the syntax along with encryption and decryption for the application layer above it.

Application Layer – It provides end-to-end user applications using protocols like HTTP, FTP, SMTP.

networking thesis proposal

It is different from the TCP/IP model. You will get a thesis guide on this topic from computer networking experts.

However, with the change of social economy, computer networking system changes a lot and have also changed people’s lifestyle in a lot of aspects. As we know with the increasing demand for network speed, a number of network provider has been also increased. Due to the maximum number of the provider, one can easily access the high speed of the internet at a low cost. Local area network which is used in lots more other sectors like medical, military, education and science. Now we can see every-one need their own personal LAN (Local Area Network). Now LAN is not only for big enterprises but it is also available for small schools and families which are looking for high speed of data in the minimum amount.

The current speed of LAN is not enough for a user so that’s why companies are doing more research and study to provide the data at higher speed without the use of high bandwidth. But as we know if we want higher speed in a short time with a wide area, bandwidth will be increased to 30% to 300%. Now one of the very well known company called Huawei launched its 5G network, which is faster than the USA 5G network. So with this network Bandwidth also increased by 300%. It is beneficial for us but at the same time, a higher bandwidth is also not good for human life.

Various exploratory and early business LAN innovations were created during the 1970s. But then a new term called WLAN is introduced to the world in 1997 to provide a wireless network. This technology got famous in a very short span of time with the name of WiFi (Wireless Fidelity).

It stands for Wireless Local Area Network. It can be another good choice for an M.Tech thesis topic in computer networking. It is a wireless distribution method that uses high-frequency radio waves with a single access point to the Internet. In other words, it is wireless communication between two or more devices such that users can move around in a limited range area. It is most commonly used in homes or offices. The component connected to WLAN is referred to as the station. There are two types of stations – Access Point, Client.

Access Points are the base stations that transmit and receive radio frequencies for wireless-enabled devices. Clients are mobile phones, laptops, desktops connected to the wireless network.

Modes of Operation of WLAN

There are two modes of operation of WLAN:

Infrastructure – In infrastructure mode, base station act as the access point and all the nodes communicate through this point.

Ad hoc – In Ad hoc mode, mobile devices transmit data directly using peer to peer method. In this, there is no base station.

WLAN Advantages

It can support a large number of devices.

It is easy to set up wireless LAN than installing cables for the wired network.

It is easier to access a wireless network than a wired network.

WLAN Disadvantages

It is difficult to expand the network.

It faces security issues like hacking.

Interference is another problem with WLAN.

WLAN is another easier topic for an M.Tech thesis. It is used everywhere. You can take thesis help on this topic from networking professionals.

Cryptography

It is the science of maintaining the privacy of data. It is also an easy topic to choose for your M.Tech thesis in networking. There are three main objectives of cryptography used in transferring data over the network:

Confidentiality

Authentication

networking thesis proposal

Cryptography employs two techniques for maintaining the privacy of data:

Encryption – In encryption, the plain text is converted into some other form known as ciphertext.

Decryption – In this technique, the converted text i.e the ciphertext is translated back to the original text.

There are two algorithms for cryptography. In a symmetric key, both the sender and the receiver share the same key for encryption and decryption.

In an asymmetric key, both the users have different keys respectively for encryption and decryption.

This is a familiar topic and very easy to understand. Take the guidance of a thesis expert about this area to start with this topic.

IEEE stands for Institute of Electrical and Electronics Engineers. IEEE 802 is a very challenging and a very good topic for your thesis. IEEE 802 comes under IEEE and deal with LAN(Local Area Network) and MAN(Metropolitan Area Network). It specifies certain services and protocols for the data link layer and physical layer of the OSI model. IEEE is further subdivided into 22 parts that cover a wide range of services.

IEEE 802 subdivides data link layer into two layers namely: Logical Link Layer(LLC)

Media Access Control(MAC)

You can choose any of its subfields as a part of your project or thesis. It is a very good area to explore.

These were some of the few topics for an M.Tech thesis in computer networking. You can also choose any one of these for research in networking or for your project. You can explore more on these topics.

If you need help with thesis topics in computer networking, you can contact us . You can call us on this number +91-9465330425 or email us at [email protected] for M.Tech and Ph.D. thesis help in computer networking. You can also fill the query form on the website.

For more details Contact Us.  You can call us on this number +91-9465330425 or drop an email at   [email protected]   for any type of dissertation help in India. You can also fill the query form on the website. 

You can also visit our website Techsparks and follow us on Pinterest , Facebook , Twitter, YouTube and Linkedin for latest thesis blog.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Quick Enquiry

Get a quote, share your details to get free.

networking thesis proposal

Thesis Proposal

In the thesis proposal, the PhD or DES student lays out an intended course of research for the dissertation.  By accepting the thesis proposal, the student’s dissertation proposal committee agrees that the proposal is practicable and acceptable, that its plan and prospectus are satisfactory, and that the candidate is competent in the knowledge and techniques required, and formally recommends that the candidate proceed according to the prospectus and under the supervision of the dissertation committee. It is part of the training of the student’s research apprenticeship that the form of this proposal must be as concise as those proposals required by major funding agencies.

The student proposes to a committee consisting of the student’s advisor and two other researchers who meet requirements for dissertation committee membership.  The advisor should solicit the prospective committee members, not the student. In cases where the research and departmental advisors are different , both must serve on the committee.

The student prepares a proposal document that consists of a core, plus any optional appendices. The core is limited to 30 pages (e.g., 12 point font, single spacing, 1 inch margins all around), and should contain sections describing 1) the problem and its background, 2) the innovative claims of the proposed work and its relation to existing work, 3) a description of at least one initial result that is mature enough to be able to be written up for submission to a conference, and 4) a plan for completion of the research. The committee commits to read and respond to the core, but reserves the right to refuse a document whose core exceeds the page limit. The student cannot assume that the committee will read or respond to any additional appendices.

The complete doctoral thesis proposal document must be disseminated to the entire dissertation committee no later than two weeks (14 days) prior to the proposal presentation. The PhD Program Administrator must be informed of the scheduling of the proposal presentation no later than two weeks (14 days) prior to the presentation. Emergency exceptions to either of these deadlines can be granted by the Director of Graduate Studies or the Department Chair on appeal by the advisor and agreement of the committee.

A latex thesis proposal template is available here .

PRESENTATION AND FEEDBACK

The student presents the proposal in a prepared talk of 45 minutes to the committee, and responds to any questions and feedback by the committee.

The student’s advisor, upon approval of the full faculty, establishes the target semester by which the thesis proposal must be successfully completed. The target semester must be no later than the eighth semester, and the student must be informed of the target semester no later than the sixth semester.

The candidacy   exam  must be successfully completed  before  the  proposal can be attempted.  The proposal must be completed prior to submitting the application for defense. [Instituted by full faculty vote September 16, 2015.]

Passing or failing is determined by consensus of the committee, who then sign the dissertation proposal form (sent to advisors by phd-advising@cs.  Failure to pass the thesis proposal by the end of the target semester or the eighth semester, whichever comes first, is deemed unsatisfactory progress: the PhD or DES student is normally placed on probation and can be immediately dismissed from the program. However, on appeal of the student’s advisor, one semester’s grace can be granted by the full faculty.

Last updated on October 16, 2023.

Find open faculty positions here .

Computer Science at Columbia University

Upcoming events, foundation models for robotic manipulation: opportunities and challenges.

Wednesday 11:40 am

CSB 451 CS Auditorium

Yunzhu Li, University of Illinois Urbana-Champaign

Class Day Graduate Ceremony

Sunday 3:00 pm

South Lawn, Morningside Campus

Class Day Undergraduate Ceremony

Monday 11:45 am

CS Awards Ceremony and Celebration

Monday 1:00 pm

In the News

Press mentions, dean boyce's statement on amicus brief filed by president bollinger.

President Bollinger announced that Columbia University along with many other academic institutions (sixteen, including all Ivy League universities) filed an amicus brief in the U.S. District Court for the Eastern District of New York challenging the Executive Order regarding immigrants from seven designated countries and refugees. Among other things, the brief asserts that “safety and security concerns can be addressed in a manner that is consistent with the values America has always stood for, including the free flow of ideas and people across borders and the welcoming of immigrants to our universities.”

This recent action provides a moment for us to collectively reflect on our community within Columbia Engineering and the importance of our commitment to maintaining an open and welcoming community for all students, faculty, researchers and administrative staff. As a School of Engineering and Applied Science, we are fortunate to attract students and faculty from diverse backgrounds, from across the country, and from around the world. It is a great benefit to be able to gather engineers and scientists of so many different perspectives and talents – all with a commitment to learning, a focus on pushing the frontiers of knowledge and discovery, and with a passion for translating our work to impact humanity.

I am proud of our community, and wish to take this opportunity to reinforce our collective commitment to maintaining an open and collegial environment. We are fortunate to have the privilege to learn from one another, and to study, work, and live together in such a dynamic and vibrant place as Columbia.

Mary C. Boyce Dean of Engineering Morris A. and Alma Schapiro Professor

Add Event to GMail

{{title}} {{fullname}}

networking thesis proposal

Courses This Semester

  • {{title}} ({{dept}} {{prefix}}{{course_num}}-{{section}})
  • FIU Handshake

SCIS FIU Logo

The KFSCIS website will be undergoing maintenance on Thursday, May 2nd from 05:00AM to 12:00PM ET to improve your user experience. During this time, some of our services may not be available. We apologize for any inconvenience this may cause.

Master of Science in Telecommunications and Networking

  • Requirements

Thesis Option

Minimum admissions requirements.

  • A bachelor’s degree in a related field as judged by the School’s Graduate Committee. The undergraduate degree must have been earned at a regionally accredited university.
  • ‘B’ average or better in all coursework attempted while registered as an upper-division student in the bachelor’s program (3.0 on a 4.0 scale).
  • For applicants whose native language is not English, English proficiency exam scores of at least 550 (paper-based) or 80 (internet-based) on the TOEFL, 6.5 on the IELTS or 110 on the Duolingo. English proficiency exam exemptions are based on the country in which the applicant completed their undergraduate degree, not on nationality or language of instruction. See the list of exempt countries here: http://gradschool.fiu.edu/toefl-exempt-countries/ .

Required Documents

  • Online graduate application /application fee.
  • Josef Silny & Associates 7101 SW 102 Avenue Miami, FL 33171 (t) 305.273.1616 www.silny.com | [email protected]
  • World Education Services PO Box 745 New York, NY 10113-0745 (t) 212.966.6311 www.wes.org | [email protected]
  • Educational Credential Evaluators, Inc. PO Box 514070 Milwaukee, WI 53203-3470 (t) 414.289.3400 www.ece.org
  • The ETS school code for the TOEFL exam is 5206.
  • IELTS can be verified directly by admissions. Plesae be sure to upload or email a copy of your official IELTS score card.
  • If admitted, All foreign educated students are required to provide proof of Degree / Diploma. This can be submitted upon arrival at FIU.

Supporting Documents (Recommended)

  • Statement of purpose
  • Three letters of recommendation

Immigration Documents

These forms are required for international students only. See  https://admissions.fiu.edu/international/submit-documents/#what  for more info.

  • Bank and Sponsor Letter
  • Declaration and Certification of Finances
  • F-1 Transfer Form (if currently residing in the U.S. on an F-1 visa)

Step One: Apply Online

All applications and associated fees, with the exception of those for the combined BS/MS program, are submitted online at  http://gradschool.fiu.edu/apply/ .

Through the website, applicants will have the opportunity to upload supporting documents, such as a statement of purpose, resume, residency documents for tuition purposes, immigration documents, and the like. They can also provide contact information for recommenders who are then prompted to submit the letters of recommendation through the online portal.

Once submitted, Graduate Admissions will promptly acknowledge receipt of the application via email and will provide a Panther ID as well as further instructions on how to access the MyFIU portal. On MyFIU, students can view the status of their application, including any missing documents. Missing documents are listed under the “To Do List” on the top right-hand corner of the screen.

Once the applicant has been issued a Panther ID, they should include the Panther ID in all communications to the unit representatives, Graduate Admissions, International Student and Scholar Services, and Student Health services.

Step Two: Submit Official Documents

Mailing address for regular U.S. mail:

Mailing address for couriers (typically used for delivering documents from outside the United States):

FIU requires official documents, even for the initial review of the applications. Required official documents include transcripts, course by course evaluation, translations, and test scores (if applicable).

Transcripts must be official. Foreign students must provide a course by course evaluation from a NACES approved agency.

Official test scores must be reported to the University by the testing agency. The University’s ETS code is 5206. IELTS scores may be verified directly by the admissions officer if the applicant provides FIU with a copy of the score report.

Please note that applications are not referred to the unit for review until required documents have been received and the application evaluation can be completed. Uploaded copies of any of these documents are considered unofficial and will not be used in evaluating the application.

Once admitted, international students will also be required to show an official proof of degree, typically a diploma, but can do so upon their arrival to FIU.

For any and all questions regarding admission required documents you must contact the office of international admissions directly at [email protected].

This program admits for the fall, spring, and summer terms.

All international applicants must abide the international applicant deadline. This includes international applicants residing in the United States and/or international applicants who do not require student visas.

Required Courses: 15 credits

  • TCN 5030 Computer Communications and Networking Technologies (or an alternate course if waived)
  • TCN 6430 Networks Management and Control Standards
  • TCN 6275 Mobile Computing
  • TCN 5080 Secure Telecommunications Transactions (or CIS 5372)
  • TCN 5640 Telecommunications Enterprise Planning and Strategy

Focus Area Courses or Thesis: 6 credits

Students must complete 6 credits in a single focus area of their choosing from the following options: Business, Communications, Software, Security, Wireless and Sensor Networks. Students enrolled in the Thesis Option will complete 6 thesis credits in lieu of fulfilling the track requirement.

Business Focus

TCN 5010 Telecommunications Technology Applications TCN 6880 Telecommunications Public Policy Development and Standards TCN 6820 Telecommunications Industry Development

Communications Focus

EEL 5500 Digital Communication Systems I EEL 5501 Digital Communication Systems II

Software Focus

TCN 5440 Software Development for Telecommunications Networks COP 5725 Principles of Database Management Systems TCN 5445 Telecommunication Network Programming

Security Focus

CIS 5373 Systems Security CIS 5374 Information Security and Privacy TCN 5455 Information Theory

Wireless and Sensor Network Focus

TCN 6270 Mobile and Wireless Networks TCN 6450 Wireless Information Systems TCN 5155 Wireless Communications with Multimedia Applications

Elective Courses: 9 credits

Elective courses may be selected from SCIS’s graduate course offerings with the exception of courses marked not applicable to SCIS degrees. A list can be found in Section 7.1 of the Graduate Program Booklet.

A maximum of 6 credits can be chosen from courses other than those listed in Section 7.1. Of these 6 credits, a maximum of 3 credits can be taken as either a 3-credit Independent Study or a 3-credit co-op course, but not both.

Students who are interested in relevant courses outside of SCIS that are not on the pre-approved list found in Section 7.2 or on the student’s degree audit should submit a request to the Graduate Program Advisor with the course details and a strong justification. The Graduate Program Director has final discretion over the inclusion of courses in a program of study.

This option requires the completion of a master’s thesis (6 credits) in addition to the 8 graduate courses (15 credits of required courses and 9 credits of elective courses). A student may commence work on the master’s thesis at any time; however, thesis credits taken prior to the approval of the M-2 form will not count toward the 6 credits of master’s thesis. (See http://gradschool.fiu.edu/students/#studentforms for the forms).

Thesis Committee

The Thesis Committee must consist of three members with Graduate Faculty Status, at least two of which hold appointments in SCIS. Typically, all three committee members hold appointments in SCIS. The Thesis Advisor is the Chairperson of the Thesis Committee. 

Thesis Proposal

A thesis proposal should be submitted after the Thesis Committee has been approved. The proposal will be given by the Thesis Advisor to the student’s Thesis Committee for review. Based on the written recommendations of its members, the Thesis Committee will make a final decision. Upon acceptance of the proposal, the M-2 Form will be completed, to indicate that the proposal has been approved. Before the submission of the M-2 form, the Graduate School requires the M.S. candidate complete an on-line “Responsible Conduct of Research Certification” training course ( http://gradschool.fiu.edu/rcr/#toggle-id-3 ).

The purpose of the thesis proposal is to convince the Committee that the chosen thesis topic and the student’s approach have a reasonable chance of success. SCIS wants to minimize the chance that the thesis will be rejected when almost completed. In particular, the thesis proposal should:

  • explain the basic idea of the thesis topic
  • argue why that topic is important
  • state what kind of results are expected
  • make plausible that these results are sufficient for a master’s thesis and that they are obtainable within the given timeframe with available resources
  • demonstrate the student’s academic qualifications for doing the proposed work

Once the M-2 Form has been approved by the University Graduate School, the student is subject to Continuous Enrollment requirements and must enroll in at least one thesis credit every term (including Summer) until he or she graduates. Exceptions to this rule can only be made by the University Graduate School via the approval of a formal leave of absence. Thesis credits taken prior to the approval of the M-2 form will not count toward the minimum 6 credits of the master’s thesis.

Thesis Defense

The master’s thesis must be a written account of a critical and scholarly study in an area in computer science. The Thesis Committee will review it critically for both content and form. The thesis may consist of:

  • independent research work
  • a critical study and analysis of known results that provide new significance and insights
  • a significant and constructive contribution to computer applications such as software development for important applications.

Once the Thesis Committee has approved the student for a final defense, the student should submit the M-3 Form at least 3 weeks prior to the expected defense date. The student and the Thesis Advisor need to coordinate with the Program Specialist to schedule an oral presentation of the thesis in the form of a public lecture. The Thesis Committee makes the final pass or fail decision.

Up-to-date information on tuition and fees is available at  http://finance.fiu.edu/controller/UG_Calculator.htm .

Currently, the cost per credit hour for a graduate-level course is $455.64 for Florida residents and $1001.69 for non-Florida residents. The estimated cost of a full-time spring or fall semester (9 credits) is $4,295.15 for Florida residents and $9,209.60 for non-Florida residents. The M.S. in Telecommunications and Networking consists of 30 credits. The estimated total cost for a full-time student is $14,446.76 for Florida residents and $30,828.26 for non-Florida residents. These estimates do not include online course fees. Tuition and fees are paid on a semester basis.

T uition, fees, and the above estimates are subject to change. Estimated costs may not reflect costs paid. 

For inquiries related to the M.S. in Telecommunications and Networking, including admissions and academic issues, please contact Rebeca Arocha, the Graduate Program Advisor. Email is preferred.

For information on the M.S. in Telecommunications and Networking, please email [email protected] .

Recent Posts

  • Cybersecurity researchers spotlight a new ransomware threat – be careful where you upload files
  • Unlocking Tomorrow’s Frontiers: KFSCIS Faculty Retreat Develops Visionary Strategies
  • American Express offers jobs, internships to 25 FIU students
  • Dr. Mark Weiss Selected as New Interim Vice Dean
  • Researchers Embark on Pioneering Marine Carbon Dioxide Removal Research

Helpful Links

  • Bachelor’s Degrees
  • Graduate Programs
  • Accelerated Degrees
  • Master’s Degrees
  • Doctoral Degrees
  • Advising Staff
  • Computer Science FAQ
  • Cybersecurity FAQ
  • Information Technology FAQ
  • Transfer Orientation Advising Sheet
  • Course Catalog
  • Academic Calendar
  • Our Promise
  • Our Achievements
  • Our Mission
  • Proposal Writing
  • System Development
  • Paper Writing
  • Paper Publish
  • Synopsis Writing
  • Thesis Writing
  • Assignments
  • Survey Paper
  • Conference Paper
  • Journal Paper
  • Empirical Paper
  • Journal Support

PhD Projects in Mobile Networking

PhD Projects in Mobile Networking give novel aid for the budding PhD/MS students. In the first place, we will work till our  fingers to the bone  for your project. In brief, mobile networking offers communication to a set of portable devices.

Stay connected for more interesting facts…

At length, we will cheer our adepts to work in mobile networking because it gives the interface for many devices with or without a medium.

PhD Projects in Mobile Networking has its focus on the bright side of life. Our experts have presented some of the key research issues of mobile networking. To begin with, look at the sample list given here for you.

NOTABLE RESEARCH AREAS IN MOBILE NETWORKING

  • MAC in 5G and future Mobile Networks
  • MAC for Mobile Ad-hoc Network
  • Mobile and Network Technologies
  • Ad-hoc Networking and Mobile
  • Mobile Social Networking
  • Wireless LAN for Mobile Computing
  • Route Optimization
  • Caching of Data Allocation
  • Compact Micro Strip Antenna
  • Security for Mobile Wireless Networks
  • Digital Communications and Mobile Computing
  • Network and Mobile Technologies in Supply Chain Management
  • Ultra-Wideband and Gigabit Wireless Communication

Together with this field, we also run our service in other popular areas. Our experts made the following section to list the fields that we support.

PRE-EMINENT RESEARCH DOMAINS

  • Internet of Things
  • Cloud Computing
  • Data Mining
  • Image Processing
  • Cybersecurity

PhD Projects in Mobile Networking  got the best axe for the students to break their research barriers. Above all, our pros are keen to work on your project. As a result of our hard work, you will reach success in your work.

An inventive things based on Delay-aware bandwidth slicing for service migration in mobile backhaul networks

An effective mechanism for Access-independent Cloud-based on Real-Time Translation Service designed for Voice Calls in Mobile Networks

A fresh mechanism for Decoupling of uplink user and HARQ response signals into relax expectancy constraint aimed at bridged fronthaul networks

An innovative mechanism for Low-latency with high-efficiency mobile fronthaul by TDM-PON based on (mobile-PON) system

A new-fangled mechanism for Hotspot-based on Resource Sharing System intended for Mobile Ad hoc Networks

An effectual function for AMCC Superimposition and Extraction through Interfering Abolition intended for 5G Mobile Front haul scheme

A novel process for Practical deployment of network coding used for real-time applications in 5G networks

An effectual development of AHP Based on Cooperative Cache Path Support in Mobile AD HOC Network

An evolving novel mechanism for Sharing of Existing Optical Distribution Network of PON with Mobile Backhaul Network for 5G Study

A new function for Price-Based on  Joint Offloading and Resource Allocation for Ad Hoc Mobile Cloud scheme

An efficient purpose for Mobile Performance Analysis Based on Joint-PRD to Enhance Small Cell Access Opportunity in 5G

A novel Design mechanism  of 802.11 Based on MANET With Transmission Control Protocol scheme

An efficient method for  Comprehensive Study based on mmWave Mobile Hotspot Network System intended for High-Speed Train Communications

A new function for Group Mobility Detection and User Connectivity Models meant for Evaluation of MNFs

An inventive function for Performance analysis of mobile 4G/LTE networks

A new source for DRA and mobile aggregator selection in mission critical MTC networks

An effectual performance for Network Coding Based on Evolutionary Network Formation aimed at Dynamic Wireless Networks

Innovative things for efficient localization algorithm meant for Mobile WSNs

A novel Study mechanism of Routing Strategies Based on Network Encoding Under Vehicle Networking

An inventive performance for QOS Improvement in MANET Routing through Route Optimization through Convergence of Mobile Agent scheme

MILESTONE 1: Research Proposal

Finalize journal (indexing).

Before sit down to research proposal writing, we need to decide exact journals. For e.g. SCI, SCI-E, ISI, SCOPUS.

Research Subject Selection

As a doctoral student, subject selection is a big problem. Phdservices.org has the team of world class experts who experience in assisting all subjects. When you decide to work in networking, we assign our experts in your specific area for assistance.

Research Topic Selection

We helping you with right and perfect topic selection, which sound interesting to the other fellows of your committee. For e.g. if your interest in networking, the research topic is VANET / MANET / any other

Literature Survey Writing

To ensure the novelty of research, we find research gaps in 50+ latest benchmark papers (IEEE, Springer, Elsevier, MDPI, Hindawi, etc.)

Case Study Writing

After literature survey, we get the main issue/problem that your research topic will aim to resolve and elegant writing support to identify relevance of the issue.

Problem Statement

Based on the research gaps finding and importance of your research, we conclude the appropriate and specific problem statement.

Writing Research Proposal

Writing a good research proposal has need of lot of time. We only span a few to cover all major aspects (reference papers collection, deficiency finding, drawing system architecture, highlights novelty)

MILESTONE 2: System Development

Fix implementation plan.

We prepare a clear project implementation plan that narrates your proposal in step-by step and it contains Software and OS specification. We recommend you very suitable tools/software that fit for your concept.

Tools/Plan Approval

We get the approval for implementation tool, software, programing language and finally implementation plan to start development process.

Pseudocode Description

Our source code is original since we write the code after pseudocodes, algorithm writing and mathematical equation derivations.

Develop Proposal Idea

We implement our novel idea in step-by-step process that given in implementation plan. We can help scholars in implementation.

Comparison/Experiments

We perform the comparison between proposed and existing schemes in both quantitative and qualitative manner since it is most crucial part of any journal paper.

Graphs, Results, Analysis Table

We evaluate and analyze the project results by plotting graphs, numerical results computation, and broader discussion of quantitative results in table.

Project Deliverables

For every project order, we deliver the following: reference papers, source codes screenshots, project video, installation and running procedures.

MILESTONE 3: Paper Writing

Choosing right format.

We intend to write a paper in customized layout. If you are interesting in any specific journal, we ready to support you. Otherwise we prepare in IEEE transaction level.

Collecting Reliable Resources

Before paper writing, we collect reliable resources such as 50+ journal papers, magazines, news, encyclopedia (books), benchmark datasets, and online resources.

Writing Rough Draft

We create an outline of a paper at first and then writing under each heading and sub-headings. It consists of novel idea and resources

Proofreading & Formatting

We must proofread and formatting a paper to fix typesetting errors, and avoiding misspelled words, misplaced punctuation marks, and so on

Native English Writing

We check the communication of a paper by rewriting with native English writers who accomplish their English literature in University of Oxford.

Scrutinizing Paper Quality

We examine the paper quality by top-experts who can easily fix the issues in journal paper writing and also confirm the level of journal paper (SCI, Scopus or Normal).

Plagiarism Checking

We at phdservices.org is 100% guarantee for original journal paper writing. We never use previously published works.

MILESTONE 4: Paper Publication

Finding apt journal.

We play crucial role in this step since this is very important for scholar’s future. Our experts will help you in choosing high Impact Factor (SJR) journals for publishing.

Lay Paper to Submit

We organize your paper for journal submission, which covers the preparation of Authors Biography, Cover Letter, Highlights of Novelty, and Suggested Reviewers.

Paper Submission

We upload paper with submit all prerequisites that are required in journal. We completely remove frustration in paper publishing.

Paper Status Tracking

We track your paper status and answering the questions raise before review process and also we giving you frequent updates for your paper received from journal.

Revising Paper Precisely

When we receive decision for revising paper, we get ready to prepare the point-point response to address all reviewers query and resubmit it to catch final acceptance.

Get Accept & e-Proofing

We receive final mail for acceptance confirmation letter and editors send e-proofing and licensing to ensure the originality.

Publishing Paper

Paper published in online and we inform you with paper title, authors information, journal name volume, issue number, page number, and DOI link

MILESTONE 5: Thesis Writing

Identifying university format.

We pay special attention for your thesis writing and our 100+ thesis writers are proficient and clear in writing thesis for all university formats.

Gathering Adequate Resources

We collect primary and adequate resources for writing well-structured thesis using published research articles, 150+ reputed reference papers, writing plan, and so on.

Writing Thesis (Preliminary)

We write thesis in chapter-by-chapter without any empirical mistakes and we completely provide plagiarism-free thesis.

Skimming & Reading

Skimming involve reading the thesis and looking abstract, conclusions, sections, & sub-sections, paragraphs, sentences & words and writing thesis chorological order of papers.

Fixing Crosscutting Issues

This step is tricky when write thesis by amateurs. Proofreading and formatting is made by our world class thesis writers who avoid verbose, and brainstorming for significant writing.

Organize Thesis Chapters

We organize thesis chapters by completing the following: elaborate chapter, structuring chapters, flow of writing, citations correction, etc.

Writing Thesis (Final Version)

We attention to details of importance of thesis contribution, well-illustrated literature review, sharp and broad results and discussion and relevant applications study.

How PhDservices.org deal with significant issues ?

1. novel ideas.

Novelty is essential for a PhD degree. Our experts are bringing quality of being novel ideas in the particular research area. It can be only determined by after thorough literature search (state-of-the-art works published in IEEE, Springer, Elsevier, ACM, ScienceDirect, Inderscience, and so on). SCI and SCOPUS journals reviewers and editors will always demand “Novelty” for each publishing work. Our experts have in-depth knowledge in all major and sub-research fields to introduce New Methods and Ideas. MAKING NOVEL IDEAS IS THE ONLY WAY OF WINNING PHD.

2. Plagiarism-Free

To improve the quality and originality of works, we are strictly avoiding plagiarism since plagiarism is not allowed and acceptable for any type journals (SCI, SCI-E, or Scopus) in editorial and reviewer point of view. We have software named as “Anti-Plagiarism Software” that examines the similarity score for documents with good accuracy. We consist of various plagiarism tools like Viper, Turnitin, Students and scholars can get your work in Zero Tolerance to Plagiarism. DONT WORRY ABOUT PHD, WE WILL TAKE CARE OF EVERYTHING.

3. Confidential Info

We intended to keep your personal and technical information in secret and it is a basic worry for all scholars.

  • Technical Info: We never share your technical details to any other scholar since we know the importance of time and resources that are giving us by scholars.
  • Personal Info: We restricted to access scholars personal details by our experts. Our organization leading team will have your basic and necessary info for scholars.

CONFIDENTIALITY AND PRIVACY OF INFORMATION HELD IS OF VITAL IMPORTANCE AT PHDSERVICES.ORG. WE HONEST FOR ALL CUSTOMERS.

4. Publication

Most of the PhD consultancy services will end their services in Paper Writing, but our PhDservices.org is different from others by giving guarantee for both paper writing and publication in reputed journals. With our 18+ year of experience in delivering PhD services, we meet all requirements of journals (reviewers, editors, and editor-in-chief) for rapid publications. From the beginning of paper writing, we lay our smart works. PUBLICATION IS A ROOT FOR PHD DEGREE. WE LIKE A FRUIT FOR GIVING SWEET FEELING FOR ALL SCHOLARS.

5. No Duplication

After completion of your work, it does not available in our library i.e. we erased after completion of your PhD work so we avoid of giving duplicate contents for scholars. This step makes our experts to bringing new ideas, applications, methodologies and algorithms. Our work is more standard, quality and universal. Everything we make it as a new for all scholars. INNOVATION IS THE ABILITY TO SEE THE ORIGINALITY. EXPLORATION IS OUR ENGINE THAT DRIVES INNOVATION SO LET’S ALL GO EXPLORING.

Client Reviews

I ordered a research proposal in the research area of Wireless Communications and it was as very good as I can catch it.

I had wishes to complete implementation using latest software/tools and I had no idea of where to order it. My friend suggested this place and it delivers what I expect.

It really good platform to get all PhD services and I have used it many times because of reasonable price, best customer services, and high quality.

My colleague recommended this service to me and I’m delighted their services. They guide me a lot and given worthy contents for my research paper.

I’m never disappointed at any kind of service. Till I’m work with professional writers and getting lot of opportunities.

- Christopher

Once I am entered this organization I was just felt relax because lots of my colleagues and family relations were suggested to use this service and I received best thesis writing.

I recommend phdservices.org. They have professional writers for all type of writing (proposal, paper, thesis, assignment) support at affordable price.

You guys did a great job saved more money and time. I will keep working with you and I recommend to others also.

These experts are fast, knowledgeable, and dedicated to work under a short deadline. I had get good conference paper in short span.

Guys! You are the great and real experts for paper writing since it exactly matches with my demand. I will approach again.

I am fully satisfied with thesis writing. Thank you for your faultless service and soon I come back again.

Trusted customer service that you offer for me. I don’t have any cons to say.

I was at the edge of my doctorate graduation since my thesis is totally unconnected chapters. You people did a magic and I get my complete thesis!!!

- Abdul Mohammed

Good family environment with collaboration, and lot of hardworking team who actually share their knowledge by offering PhD Services.

I enjoyed huge when working with PhD services. I was asked several questions about my system development and I had wondered of smooth, dedication and caring.

I had not provided any specific requirements for my proposal work, but you guys are very awesome because I’m received proper proposal. Thank you!

- Bhanuprasad

I was read my entire research proposal and I liked concept suits for my research issues. Thank you so much for your efforts.

- Ghulam Nabi

I am extremely happy with your project development support and source codes are easily understanding and executed.

Hi!!! You guys supported me a lot. Thank you and I am 100% satisfied with publication service.

- Abhimanyu

I had found this as a wonderful platform for scholars so I highly recommend this service to all. I ordered thesis proposal and they covered everything. Thank you so much!!!

Related Pages

Phd Projects In Communication

Phd Projects In Machine To Machine Communication

Phd Projects In Peer Peer Network

Phd Projects In Computer Science

Phd Projects In Communication Engineering

Phd Projects In Mobile Computing

Phd Projects In Communication System

Phd Projects In Mobile Cloud Computing

Phd Projects In Cse

Phd Projects In Computer Networking

Phd Projects In Mobile Applications

Phd Projects In Computer Networks

Phd Projects In M2m

Phd Projects In Peer To Peer Network

Phd Projects In Computer Science Engineering

We use cookies to make your experience on this website better.

Accept Cookies

College of Sciences and Mathematics Homepage

  • Toggle Search
  • Find People

“Urban Agglomerations and Climate Dynamics: A Multifaceted Approach Integrating Global Urban Footprints, Mesoscale Modeling, and Weather-Climate Impact Assessment”

Dissertation Proposal by Subhasis Ghosh

In the News

Ahead of Florida amendment vote, DEA reportedly moves to reclassify marijuana as less harmful

Florida to vote on recreational marijuana in november.

networking thesis proposal

As Florida heads toward possible legalization of recreational marijuana this November, the U.S. Drug and Enforcement Administration is considering reclassifying it under the Controlled Substances Act as a less dangerous drug, the Associated Press and others reported Tuesday based on anonymoussources familiar with the change.

That would be the biggest change in federal marijuana policy in over 50 years, but the change wouldn't make weed legal.

Marijuana is currently classified as a Schedule I drug in the same category such as heroin and LSD, meaning it has no medical benefits and a high potential for abuse. If approved, marijuana would instead be classed as a Schedule III drug, similar to ketamine, testosterone, some anabolic steroids or Tylenol with codeine and eligible for prescription.

Marijuana has been a Schedule I drug since the Controlled Substances Act was signed in 1970.

This would only be the first step. The DEA's proposal must be reviewed by the White House Office of Management and Budget and then opened to public comment. If approved, marijuana would be classed as a "Schedule III" drug, similar to ketamine, testosterone, some anabolic steroids or Tylenol with codeine.

Recreational marijuana is legal in 24 states , three U.S. territories, and D.C. so far, according to the Pew Research Center. Medical marijuana is legal in 14 other states and will be legal in Kentucky in 2025.

In President Joe Biden's State of The Union address  in March he called for a federal review of marijuana with an eye toward reclassification. The Biden administration has been working to, if not legalize it, send clear signals that the previous approach to marijuana use was wrong by first  pardoning people with federal convictions for simple possession of marijuana  in 2022 and then issuing in December 2023 a " full, complete, and unconditional pardon " to every American who uses marijuana or has in the past.

Florida to vote on legal recreational marijuana in November

Florida has a chance to join the list of states with legal recreational marijuana when the question comes up as a proposed constitutional amendment in the 2024 general election .

After months of back and forth over whether Amendment 3 was worded correctly, the state Supreme Court ruled it could go on the ballot .

If  voters pass  the measure,  anyone 21 years old and older would be able to use and possess up to 3 ounces of marijuana  with  not more than 5 grams in a concentrated  form (with assorted restrictions). Pot could be sold through  marijuana dispensaries  without the need for a  medical marijuana card.

Marijuana possession, sales, transportation and use would still be against federal law, however.

To pass, the recreational marijuana amendment would have to receive a supermajority or 60% of the vote.

What will reclassifying marijuana as a Schedule III drug do?

Marijuana will still be illegal under federal law and in states that have not yet legalized it. But aside from the shift in public perception toward cannabis and the government's de-emphasis on penalizing cannabis users, the change has one major impact: finance.

Cannabis businesses currently fall under Section 280E of the IRS tax code, which forbids businesses involved in the "trafficking" of Schedule I and Schedule II substances from deducting "ordinary and necessary" business expenses from their taxes. If weed becomes a Schedule III drug, that prohibition goes away.

Depending on if and when the proposal is published, the change also could have an effect on Florida voters.

It's also potentially a step toward complete legalization, which means federally insured banks could take on cannabis clients, cannabis businesses could start taking credit card payments without worrying about their accounts being frozen, and consumers and businesses would no longer have to worry about skirting federal law.

What are Schedule I drugs?

The DEA classifies drugs based on their medical usefulness and their potential for abuse or dependency. The categories are:

  • Schedule I: Drugs with no currently accepted medical use and a high potential for abuse. Examples: heroin, LSD, marijuana (cannabis), ecstasy, methaqualone, and peyote.
  • Schedule II: Drugs with a high potential for abuse, with use potentially leading to severe psychological or physical dependence. Examples: Vicodin, cocaine, methamphetamine, methadone, hydromorphone (Dilaudid), meperidine (Demerol), oxycodone (OxyContin), fentanyl, Dexedrine, Adderall, and Ritalin.
  • Schedule III: Drugs with a moderate to low potential for physical and psychological dependence. Examples: Tylenol with codeine, ketamine, anabolic steroids, testosterone.
  • Schedule IV: Drugs with a low potential for abuse and low risk of dependence. Examples: Xanax, Soma, Darvon, Darvocet, Valium, Ativan, Talwin, Ambien, Tramadol.
  • Schedule V: Drugs with lower potential for abuse than Schedule IV and consist of preparations containing limited quantities of certain narcotics. Examples: Robitussin AC, Lomotil, Motofen, Lyrica, Parepectolin.

What is marijuana?

Marijuana is a greenish-gray mixture of the dried flowers from the Cannabis sativa or Cannabis indica plant, according to the  National Institute of Drug Use.

The main psychoactive chemical in marijuana, responsible for most of the intoxicating effects that users want, is delta-9-tetrahydrocannabinol, or THC. The chemical is found in resin produced by the leaves and buds primarily of the female cannabis plant.

The plant also contains more than 500 other chemicals, including more than 100 compounds that are chemically related to THC, called cannabinoids.

Is it legal to smoke weed in Florida? Here's a look at the state's marijuana laws

Is weed legal in Florida?

Medical marijuana is currently  legal in Florida  only for residents who have been diagnosed with a qualifying condition and issued a  Medical Marijuana ID Card . Medical marijuana must be purchased at a  licensed dispensary .

The qualifying conditions are:

  • Crohn’s disease
  • Parkinson’s disease
  • Multiple sclerosis (MS)
  • Post-traumatic stress disorder (PTSD)
  • Amyotrophic lateral sclerosis (ALS)
  • Medical conditions of the same kind or class, or comparable to the ones listed above
  • A terminal condition (must be diagnosed by a physician either than the one issuing the certification for the card)
  • Chronic nonmalignant pain caused by a qualifying medical condition or that originates from a qualifying medical condition and persists beyond the usual course of that qualifying medical condition

Qualified caregivers also may get Medical Marijuana cards  to buy, transport and prepare marijuana for use by patients.

  • Election 2024
  • Entertainment
  • Newsletters
  • Photography
  • Personal Finance
  • AP Investigations
  • AP Buyline Personal Finance
  • AP Buyline Shopping
  • Press Releases
  • Israel-Hamas War
  • Russia-Ukraine War
  • Global elections
  • Asia Pacific
  • Latin America
  • Middle East
  • Election Results
  • Delegate Tracker
  • AP & Elections
  • Auto Racing
  • 2024 Paris Olympic Games
  • Movie reviews
  • Book reviews
  • Personal finance
  • Financial Markets
  • Business Highlights
  • Financial wellness
  • Artificial Intelligence
  • Social Media

Arizona House advances a repeal of the state’s near-total abortion ban to the Senate

Arizona Rep. Stephanie Stahl Hamilton, D-Tucson, left, gets a hug from Sen. Anna Hernandez, D-Phoenix, after the vote tally on the proposed repeal of Arizona's near-total ban on abortions winning approval from the state House Wednesday, April 24, 2024, in Phoenix. (AP Photo/Ross D. Franklin)

Arizona Rep. Stephanie Stahl Hamilton, D-Tucson, left, gets a hug from Sen. Anna Hernandez, D-Phoenix, after the vote tally on the proposed repeal of Arizona’s near-total ban on abortions winning approval from the state House Wednesday, April 24, 2024, in Phoenix. (AP Photo/Ross D. Franklin)

  • Copy Link copied

Speaker of the House Ben Tom, R-Peoria, pauses while speaking as he watches the vote tally on the proposed repeal of Arizona’s near-total ban on abortions winning approval from the state House, Wednesday, April 24, 2024, in Phoenix. (AP Photo/Ross D. Franklin)

Arizona Speaker Pro Tempore Travis Grantham, R-Gilbert, speaks after the vote tally on the proposed repeal of Arizona’s near-total ban on abortions winning approval from the state House Wednesday, April 24, 2024, in Phoenix. (AP Photo/Ross D. Franklin)

Arizona House Minority Leader Lupe Contreras, left, D-Cashion, walks in front of Speaker of the House Ben Toma, R-Peoria, right, prior to the vote tally on the proposed repeal of Arizona’s near-total ban on abortions winning approval from the state House Wednesday, April 24, 2024, in Phoenix. (AP Photo/Ross D. Franklin)

FILE - The historic Arizona Capitol building stands, April 11, 2024, in Phoenix. Democrats in the Arizona House are expected on Wednesday, April 24, to make another attempt to repeal Arizona’s near-total abortion ban, which the state’s highest court says can be enforced. (AP Photo/Ross D. Franklin, File)

FILE - Democratic state Rep. Stephanie Stahl Hamilton, sponsor of a proposal to repeal Arizona’s near-total ban on abortion, speaks on the floor of the Arizona House in Phoenix on April 17, 2024. Democrats in the Arizona House are expected on Wednesday, April 24, to make another attempt to repeal the the long-dormant abortion law, which the state’s highest court says can be enforced. (AP Photo/Matt York, File)

PHOENIX (AP) — A proposed repeal of Arizona’s near-total ban on abortions won approval from the state House Wednesday after two weeks of mounting pressure on Republicans over an issue that has bedeviled former President Donald Trump’s campaign to return to the White House.

Three Republicans joined in with all 29 Democrats Wednesday to repeal a law that predated Arizona’s statehood and provides no exceptions for rape or incest. If the Senate approves as expected, Arizona would allow abortions up to 15 weeks.

Their political ambitions imperiled by widespread opposition to a near-total abortion ban, Trump and U.S. Senate candidate Kari Lake had urged Arizona lawmakers to ease the restrictions. But until Wednesday, most state House Republicans repeatedly used procedural votes to block repeal, each time drawing condemnation from Democratic President Joe Biden , who has made his support for abortion rights central to his reelection campaign .

“Make no mistake, Arizonans are living in 1864 now because Donald Trump dismantled Roe v. Wade,” Democratic state Sen. Priya Sundareshan of Tucson said in a news conference before the vote organized by the Biden campaign and the Arizona Democratic Party.

FILE - Abortion rights supporters gather outside the Capitol, Wednesday, April 17, 2024, in Phoenix. Arizona doctors could come to California and provide abortions for their patients under a new proposal announced Wednesday, April 24, 2024, by Gov. Gavin Newsom aimed at circumventing a state law that bans nearly all abortions in that state. (AP Photo/Matt York, File)

The repeal vote comes a day after Biden said Trump created a “health care crisis for women all over this country,” by imperiling their access to care. White House press secretary Karine Jean-Pierre said the vote is a sign that “we’re moving forward in the right direction.”

Arizona is one of a handful of battleground states that will decide the next president. Trump, who has warned that the issue could lead to Republican losses, has avoided endorsing a national abortion ban but said he’s proud to have appointed the Supreme Court justices who allowed states to outlaw it.

Dozens of people gathered outside the state Capitol before the House and Senate were scheduled to meet, then filled seats in the public gallery as lawmakers voted, many of them carrying signs or wearing shirts showing their opposition to abortion rights.

Arizona Republicans have been under intense pressure from some conservatives in their base, who firmly support the abortion ban, even as it’s become a liability with swing voters who will decide crucial races including the presidency, the U.S. Senate and the GOP’s control of the Legislature.

“I am disgusted today,” said Republican Rep. Rachel Jones, who voted against repeal. “Life is one of the tenets of our Republican platform. To see people go back on that value is egregious to me.”

State Rep. Matt Gress, one of the three Republicans who crossed party lines to support the repeal measure, said in a statement that the near-total abortion ban was “unworkable and out of line with the values of Arizonans.” GOP Rep. Tim Dunn said counterintuitively that his vote in favor of repeal was “the most pro-life vote I could possibly make” because, he said, backlash to the total ban would lead voters to support abortion even after 15 weeks.

The other Republican who supported the repeal measure, state Rep. Justin Wilmeth, didn’t return an email and phone call seeking comment on the vote.

California Gov. Gavin Newsom and several lawmakers said Wednesday they’ll push for legislation temporarily allowing Arizona doctors to perform abortions for their own patients in the neighboring state.

The Arizona Supreme Court concluded this month that the state can enforce a long-dormant law that permits abortions only to save the pregnant patient’s life. The ruling suggested doctors could be prosecuted under the law first approved in 1864, which carries a sentence of two to five years in prison for anyone who assists in an abortion.

The law had been blocked since the U.S. Supreme Court’s 1973 Roe v. Wade decision guaranteed the constitutional right to an abortion nationwide.

After Roe v. Wade was overturned in June 2022, then-Arizona Attorney General Mark Brnovich, a Republican, persuaded a state judge that the 1864 ban could be enforced . Still, the law hasn’t actually been enforced while the case was making its way through the courts. Brnovich’s Democratic successor, Attorney General Kris Mayes, urged the state’s high court against reviving the law.

Mayes has said the earliest the law could be enforced is June 8, though the anti-abortion group defending the ban, Alliance Defending Freedom, maintains county prosecutors can begin enforcing it once the Supreme Court’s decision becomes final, which is expected to occur this week.

If the proposed repeal wins final approval from the Republican-controlled Legislature and is signed into law by Democratic Gov. Katie Hobbs, a 2022 statute banning the procedure after 15 weeks of pregnancy would become the prevailing abortion law. Even so, there would likely be a period where all abortion is outlawed, because the repeal won’t take effect until 90 days after the end of the legislative session, likely in mid-summer.

Planned Parenthood officials vowed to continue providing abortions for the short time they are still legal and said they will reinforce networks that help patients travel out of state to places like New Mexico and California to access abortion.

Advocates are collecting signatures for a ballot measure allowing abortions until a fetus could survive outside the womb, typically around 24 weeks, with exceptions — to save the parent’s life, or to protect her physical or mental health.

Republican lawmakers, in turn, are considering putting one or more competing abortion proposals on the November ballot.

A leaked planning document outlined the approaches being considered by House Republicans, such as codifying existing abortion regulations, proposing a 14-week ban that would be “disguised as a 15-week law” because it would allow abortions until the beginning of the 15th week, and a measure that would prohibit abortions after six weeks of pregnancy, before many people know they’re pregnant.

House Republicans have not yet publicly released any such proposed ballot measures.

networking thesis proposal

Part of Stadium Freeway/Highway 175 could be converted to 4-lane boulevard under new plan

networking thesis proposal

Much of a roughly 1½-mile stretch of Milwaukee's Stadium Freeway could be converted into a four-lane boulevard that connects with other city streets under new plans.

The freeway, also known as Wisconsin Highway 175, would be decommissioned between Wisconsin and Lisbon avenues under Wisconsin Department of Transportation proposals. That work, if it receives state funding, is likely years from happening.

WisDOT unveiled several conceptual alternatives Tuesday during an open house at the Washington Park Senior Center that drew hundreds of residents.

Alternatives include a tunnel to carry traffic through part of the former freeway corridor.

Another possibility would maintain the six-lane, limited-access highway, which is nearing the end of its life before needing reconstruction.

A new boulevard would better connect neighborhoods on Milwaukee's west side separated by the freeway, and accommodate pedestrians, cyclists and buses along with motorists, the proposal's supporters say.

Replacing the freeway with a street grid also would provide opportunities to develop new housing − adding to the city's population and its tax base.

The conceptual plans show upward of 30 acres being made available for public space or development.

WisDOT's Reimagining Wisconsin 175 Study "presents an opportunity to reconnect residents and neighborhoods that were historically divided due to urban renewal and interstate development," Milwaukee County Executive David Crowley said.

"I will support a plan that helps address public safety and reckless driving, boosts economic development, and enhances community connectivity with recreational areas and greenspace," Crowley said, in a statement.

Highway 175 part of larger freeway network that was dropped

WisDOT officials say the decommissioning plans may be feasible because the freeway appears to provide more capacity than needed for the number of vehicles that use the road. A detailed traffic analysis is in the works.

Stadium Freeway North, constructed in 1962, was part of a larger planned freeway network that wasn't built.

Not everyone likes the idea of removing the freeway.

It has a significant traffic load, said Jonathan Rupprecht, who lives in the Washington Heights neighborhood. A surface street that replaces it would face traffic congestion, he said.

WisDOT is studying the freeway alternatives with officials from the Milwaukee Department of Public Works and Milwaukee County Department of Transportation, and continues gathering public input.

That will include another public open house this winter, said Doug Cain, WisDOT project manager. He said the agency will refine plans to two or three alternatives before issuing a final study next spring.

That could then be the basis for seeking state funding for the project, Cain said. It isn't known yet whether that funding might be approved by the Legislature in the 2025-'27 state budget cycle.

Stadium Freeway North connects to Interstate 94 just south of Wisconsin Avenue.

WisDOT's $1.74 billion reconstruction and expansion of I-94 on Milwaukee's west side is to begin in late 2025.

That project includes replacing the Stadium Interchange with a diverging diamond interchange . That type of interchange is typically used to accommodate a major surface street intersecting a limited-access freeway.

Tom Daykin can be emailed at  [email protected]  and followed on  Instagram ,  X  and  Facebook .

IMAGES

  1. How To Write A Thesis Proposal

    networking thesis proposal

  2. 🔥 Network infrastructure proposal sample. 9+ SAMPLE Network Project

    networking thesis proposal

  3. Networking Proposal Template in 2021

    networking thesis proposal

  4. Trending Top 13 Thesis Topics in Computer Networking [Novel Proposal

    networking thesis proposal

  5. FREE 10+ Thesis Proposals in Google Docs

    networking thesis proposal

  6. Research PhD Thesis on Networking (Paper Writing/Publishing/Thesis)

    networking thesis proposal

VIDEO

  1. Thesis Proposal Presentation Muhammad Alfian 1709620085

  2. Presentation Thesis Proposal with the title "Analysis Job Training at PT Patra Jasa"

  3. thesis proposal 2024

  4. rs thesis proposal paper revisions

  5. Introduction to Thesis Proposal Seminar Presentation

  6. Professional Networking & Thesis Topic Selection

COMMENTS

  1. 10 Computer Networking Dissertation Topics

    2022 Computer Networking Dissertation Topics. Research Aim: The research aims to evaluate the network security issues associated with M2M communication in IoT. Objectives: To evaluate the factors affecting the network security of IoT devices. To determine the methods for increasing data integrity in M2M communication against physical tampering ...

  2. 15 comprehensive networking research topics for students

    For network performance, Wireshark can be used for testing network performance (George et al., 2020). References. Bilal, KErbad, A. and Hefeeda, M. (2018) "QoE-aware distributed cloud-based live streaming of multi-sourced Multiview Videos," Journal of Network and Computer Applications, 120, pp. 130-144.

  3. Design and Implementation of a Network Service Marketplace

    In this thesis, we design and implement a network. service marketplace. Due to the. exibility and functionality of web application, the. marketplace is implemented by a web application to ful ll functions such as storing. and searching network services, handling actual.

  4. Student Thesis

    Many proposal for network designs and routing algorithms covering different operational goals and requirements have been proposed. ... Such a human-centric process can be tedious and does not scale well with increasing network complexity. In this thesis, the student should perform a thourough analysis of the described data and evaluate the ...

  5. Thesis and Research Topics in Computer Networking?

    Therefore, I propose the following research topic for a thesis written in the field of computer networks: Improving security, procedures and techniques to protect sensitive information residing in ...

  6. Thesis proposals on computer networking (DISCO)

    Below you find open thesis proposals related to the research group DISCO (Distributed Systems and Communications) within Computer Science at Karlstad University. The list of topics below is outdated and will be removed soon. You find currently open master thesis topics here. Application form. Send your application form to [email protected].

  7. CSSA Sample PhD proposals

    It includes advice about selecting a topic, preparing a proposal, taking your oral exam and finishing your dissertation. It also includes accounts by many people about the process that each of them went through to find a thesis topic. Adding to the Collection. This collection of proposals becomes more useful with each new proposal that is added.

  8. PDF Thesis Proposal

    Thesis Proposal Contextualized Conversational Network Dynamics on Social Media Thomas Magelinski April 28, 2022 School of Computer Science ... Network Science provides a framework to understand the large-scale discussions that happen on social media and their impact on society. However, a standard network model of a conversational

  9. (PDF) Local Area Network Design proposal

    Local Area Netw ork Design. Konsta ntinos Bazo ukis. k.bazoukis@mc -class.gr. Network design proposal for Derwent College. 1. Introduction and Requirements of the Report. This re port aim s to c ...

  10. Topics for a Thesis in Computer Networking

    By Christopher Faille. Computer networking is an engineering discipline dealing with the relationships between two or more computer systems or devices, whether through the Internet, an intranet, or an extranet. The study of computer networks involves both hardware and software issues, presenting you with several possible thesis topics.

  11. 59 Best Networking Dissertation Topics |Computer Networking

    Some of the important and appealing/interesting networking dissertation topics are listed below. The impact of 5G technology on mobile networks. The use of software-defined networking in data centers. The security of IoT networks. The use of network virtualization in cloud computing. The impact of edge computing on network architecture.

  12. PDF Wireless Networks Performance Study a Thesis Submitted to The Graduate

    This thesis evaluates the performance of the 802.11 wireless network. The newly defined DCF+ protocol performance is studied and compared with the DCF protocol under different traffic conditions. A service differentiation mechanism is also applied to both protocols for basic access mechanism and the efficiency of the protocols is examined.

  13. PDF NETWORK SECURITY

    This thesis starts out with an overview of how insecurity came into the picture on networking and it also brings to the attention security challenges network administrator are facing as a result of the needed growth by the organization. It progresses on to include the study of the problem at hand as well as how the ...

  14. Thesis and Research Topics in Computer Networking

    If you need help with thesis topics in computer networking, you can contact us. You can call us on this number +91-9465330425 or email us at [email protected] for M.Tech and Ph.D. thesis help in computer networking. You can also fill the query form on the website. For more details Contact Us.

  15. PDF Wireless Local Area Networking For Device Monitoring

    In this thesis, a wireless local area networking technique is developed, which is intended for use in a device monitoring system. A full review of the current wireless local communications protocols 802.11, 802.11a, 802.11b, 802.11g, HomeRF, Bluetooth, and Ultrawideband is presented. A detailed comparison of these techniques is performed with ...

  16. PDF St. Mary'S University

    version I could become. Babiye you are my soul, this thesis would not have been finished without your help and guidance. You were the editor in-chief giving me critiques and suggestions to finish the research. ... VPN Virtual Private Network . viii SVS Service Value System ISACA Information Systems Audit and Control Association ITSM IT Service ...

  17. How to Write a Research Proposal

    Example research proposal #1: "A Conceptual Framework for Scheduling Constraint Management" Example research proposal #2: "Medical Students as Mediators of Change in Tobacco Use" Title page. Like your dissertation or thesis, the proposal will usually have a title page that includes: The proposed title of your project; Your name

  18. Thesis Proposal

    PURPOSE. In the thesis proposal, the PhD or DES student lays out an intended course of research for the dissertation. By accepting the thesis proposal, the student's dissertation proposal committee agrees that the proposal is practicable and acceptable, that its plan and prospectus are satisfactory, and that the candidate is competent in the knowledge and techniques required, and formally ...

  19. Master of Science in Telecommunications and Networking

    A thesis proposal should be submitted after the Thesis Committee has been approved. The proposal will be given by the Thesis Advisor to the student's Thesis Committee for review. ... The M.S. in Telecommunications and Networking consists of 30 credits. The estimated total cost for a full-time student is $14,446.76 for Florida residents and ...

  20. Proposal

    PDF | On Jan 27, 2013, Joshua White published Proposal - An Exploratory Approach to Social Network Analysis | Find, read and cite all the research you need on ResearchGate

  21. Graph Neural Networks

    This dissertation focuses particularly on the topic of graph neural networks (GNNs) as the main machine learning model for successfully addressing problems involving graph data. GNNs are nonlinear representation maps that exploit the underlying graph structure to improve learning and achieve better performance.

  22. PhD Projects in Mobile Networking

    PhD Projects in Mobile Networking got the best axe for the students to break their research barriers. Above all, our pros are keen to work on your project. As a result of our hard work, you will reach success in your work. An inventive things based on Delay-aware bandwidth slicing for service migration in mobile backhaul networks.

  23. PDF Social Network Extraction from Texts: A Thesis Proposal

    Social Network Extraction from Texts: A Thesis Proposal. Apoorv Agarwal Department of Computer Science Columbia University [email protected] Abstract. In my thesis, I propose to build a system that would enable extraction of social interactions from texts. To date I have dened a compre- hensive set of social events and built a prelim ...

  24. Geosciences Dissertation Proposal

    Geosciences Dissertation Proposal - Subhasis Ghosh: Time: May 02, 2024 (12:00 PM) Location: Haley 2194 Details: "Urban Agglomerations and Climate Dynamics: A Multifaceted Approach Integrating Global Urban Footprints, Mesoscale Modeling, and Weather-Climate Impact Assessment" ...

  25. DEA moves to reclassify marijuana as Schedule I, AP says

    Marijuana has been a Schedule I drug since the Controlled Substances Act was signed in 1970. This would only be the first step. The DEA's proposal must be reviewed by the White House Office of ...

  26. Ph.D. Dissertation Proposal Defense in Energy Engineering

    The Francis College of Engineering, Department of Energy Engineering - Nuclear, invites you to attend a Doctoral Dissertation Proposal defense by Julian Eduardo Barra Otondo on "Inverse Design of Material Mixtures." Candidate Name: Julian Eduardo Barra Otondo Degree: Doctoral Defense Date: Monday, May 6, 2024 Time: 9 to 11 a.m.

  27. Arizona House approved a repeal of the state's near-total abortion ban

    FILE - Democratic state Rep. Stephanie Stahl Hamilton, sponsor of a proposal to repeal Arizona's near-total ban on abortion, speaks on the floor of the Arizona House in Phoenix on April 17, 2024. Democrats in the Arizona House are expected on Wednesday, April 24, to make another attempt to repeal the the long-dormant abortion law, which the ...

  28. Ph.D. Dissertation Proposal Defense in Biomedical Engineering: Kian

    04/28/2024 By Kian Barari. The Francis College of Engineering, Department of Biomedical Engineering, invites you to attend a doctoral dissertation proposal defense by Kian Barari on: "Mask-Wearing Thermoregulation and Speech Flows: Analyzing Respiratory Flows with Computational Modeling, Sensor Techniques, and Schlieren Imaging."

  29. Part of Milwaukee freeway near American Family Field could be removed

    A roughly 1½-mile stretch of Milwaukee's Stadium Freeway could be converted into a four-lane boulevard that connects with other city streets under new plans.. The freeway, also known as Wisconsin ...

  30. Securing North Carolina's Future: Governor Cooper Presents Budget that

    Today, Governor Roy Cooper released his recommended budget for FY 2024-2025, Securing North Carolina's Future. The Governor's plan would raise teacher pay by 8.5% and invest over $1 billion in public schools across North Carolina instead of more taxpayer-funded private school vouchers.