Thursday 19 January 2012

Networking Projects


Hey Friends , there are some networking projects , if anyone interested in networking and want to learn more other than basic academics.
Below is a list of Networking Projects that are helpful for Engineering Students
  • Development of SDIO stack for MMC applications
  • Implementation of DHCP protocol for embedded applications
  • Development of TCP/IP stack for network applications
  • Designing of link loop as a server side utility
  • Designing of network booting environment for diskless Linux pc’s
  • Implementation of SSL protocol for network transactions
  • Development of cipher key for network security
  • Transmission of signaling messages using m3ua protocol
  • Bluetooth stack and its applications FTP, wireless head set, synchronization
  • Design of sip stack for mobile applications
  • Interoperability project for WLAN and HFC technologies
  • Developing a remote server using ICMP
  • Development of MIB tree for network management system
  • Design of multi-association in stream control transmission protocol
  • Implementation of TLS protocol for secured communication
  • Efficient approximate query processing in peer-to-peer networks
  • Monitoring the Application- Layer DDoS Attacks for popular Websites
  • The Design Trade-offs of Bit Torrent like File Sharing Protocol
  • A Directory Service for Perspective Access Networks
  • Multiple Routing Configurations for Fast IP Network Recovery
  • Ethernet Networks
  • Understanding and Mitigating the Effects of Count to Infinity in
  • Measuring Capacity Bandwidth of Targeted Path Segments
  • Implementation of DCCP for feature negotiation mechanism in Linux pc’s
  • Approximate entropy-based epileptic EEG detection using ANN
  • User Browsing Behaviors
  • A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on
  • Stream Switching Resilience Web User-Session Inference by Means of Clustering Techniques
  • An Improvement in Apriori algorithm Using Profit And Quantity
  • Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP Application
  • mTracker: A Mobile Tracking Application for Pervasive Environment
  • Detecting Suspicious Motion with Non-imaging Sensors
  • Android, Java ME and Windows Mobile interplay
  • Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly Factory
  • SLA-based Online Charging Model in Mobile Environment
  • Implementation of ethercat protocol issues on embedded Linux platform
  • Peer-to-Peer Overlay Gateway Services for Home Automation and Management
  • Analysis of Anonymity in P2P Anonymous Communication Systems
  • A Context Conflict Resolution with Optimized Mediation
  • HiTrust: A Hybrid Tree based Trust Negotiation Service
  • An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System
  • Improved Gait Recognition Performance Using Cycle Matching
  • Towards a Unified Trust Model in Pervasive Systems
  • Quality Metrics for Software Process Certification based on K-model
  • An Authentication and Authorization protocol using Ticket in Pervasive Environment.
  • Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database
  • SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet
  • Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones
  • Practical Threshold One-Time Proxy Signature Scheme
  • Security Verification for Authentication and Key Exchange Protocols, Revisited
  • Requirements for Distributed Event-based Awareness in P2P Groupware Systems
  • Virtual Database Technology for Distributed Database
  • Routing based on Message Attraction
  • Effect of Virtual Techniques in Data Storage Access
  • Generating Optimum Number of Clusters using Median Search and Projection Algorithms
  • Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing
  • Analytical Temporal Specification Issues for Industrial Control Systems
  • AWorkflow Fragmentation Framework for Enterprise GridWorkflow Systems
  • Knowledge sharing effectiveness measurement
  • Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration
  • Using Ontology for Personalized Mobile Message Computation
  • Knowledge sharing effectiveness measurement
  • Using Ontology for Personalized Mobile Message Computation
  • Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
  • Towards Near Real-Time Data Warehousing
  • Grid of Segment Trees for Packet Classification
  • Propagation Modeling of Peer-to-Peer Worms
  • Automatic Application Signature Construction from Unknown Traffic
  • Deployment of a Secure Wireless Infrastructure oriented to Vehicular Networks
  • Resist Intruders’ Manipulation via Context-based TCP/IP Packet Matching
  • IDSec: an Identification Layer Security Model
  • Secure Communication For Internet Payment In Heterogeneous Networks
  • Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
  • Non-Interactive Information Reconciliation for Quantum Key Distribution
  • A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
  • InnoDB Database Forensics
  • Controlling File Distribution in The Share Network Through Content Poisoning
  • Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
  • HealthPass: Fine-grained Access Control to Portable Personal Health Records
  • Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies
  • Using Recommendation to Limit Search Space in Web Services Discovery
  • Sink-initiated Geographic Multicasting Protocol in Wireless Sensor Networks
  • Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
  • Symbolic Routing for Location-based Services in Wireless Mesh Networks
  • Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
  • A Dynamic Normalized Weighting based Context Reasoning in Home-based Care
  • Web Spambot Detection Based on Web Navigation Behavior
  • Key Parameters in Identifying Cost of Spam 2.0
  • Empirical Analysis of Attackers Activity on Multi-TierWeb Systems
  • Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach
  • Against Spyware Using CAPTCHA in Graphical Password Scheme
  • MARS: Multi-stage Attack Recognition System
  • Context-aware Mobile Services Transactions
  • User-Excentric Service Composition in Pervasive Environments
  • A Tree Graph Model Based on Mobile Environment
  • New Approach to Quantification of Privacy on Social Network Sites
  • Trustworthiness among Peer Processes in Distributed Agreement Protocol
  • BPE Acceleration Technique for S/W Update for Mobile Phones
  • A Secure Key Management Model for Wireless Mesh Networks
  • A Novel Cross Layer Intrusion Detection System in MANET
  • A Cross-Layer Decision for Mobile IP Handover
  • Adaptive Clustering Protocol for Wireless Networks
  • An Adaptive Routing Protocol for Bus Networks
  • Mapping the Blogosphere with RSS-Feeds
  • A DSL-based Approach to Software Development and Deployment on Cloud
  • CAPTCHA Using Strangeness in Machine Translation
  • Community-Aware Scheduling Protocol for Grids
  • Key Agreement in Peer-to-Peer Wireless Networks
  • Applying TCP-Friendly Congestion Control to Concurrent Multi-path Transfer
  • Schedule Distributed Virtual Machines in a Service Oriented Environment
  • Minimizing Execution Costs when using Globally Distributed Cloud Services
  • The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
  • Change Scheduling Based on Business Impact Analysis of Change-Related Risk
  • Performance Evaluation of Database Designs
  • Accountability Computing for e-Society
  • A Photonics Based Intelligent Airport Surveillance and Tracking System
  • Design of network based software