Hey Friends , there are some networking projects , if anyone interested in networking and want to learn more other than basic academics.
Below is a list of Networking Projects that are helpful for Engineering Students
- Development of SDIO stack for MMC applications
- Implementation of DHCP protocol for embedded applications
- Development of TCP/IP stack for network applications
- Designing of link loop as a server side utility
- Designing of network booting environment for diskless Linux pc’s
- Implementation of SSL protocol for network transactions
- Development of cipher key for network security
- Transmission of signaling messages using m3ua protocol
- Bluetooth stack and its applications FTP, wireless head set, synchronization
- Design of sip stack for mobile applications
- Interoperability project for WLAN and HFC technologies
- Developing a remote server using ICMP
- Development of MIB tree for network management system
- Design of multi-association in stream control transmission protocol
- Implementation of TLS protocol for secured communication
- Efficient approximate query processing in peer-to-peer networks
- Monitoring the Application- Layer DDoS Attacks for popular Websites
- The Design Trade-offs of Bit Torrent like File Sharing Protocol
- A Directory Service for Perspective Access Networks
- Multiple Routing Configurations for Fast IP Network Recovery
- Ethernet Networks
- Understanding and Mitigating the Effects of Count to Infinity in
- Measuring Capacity Bandwidth of Targeted Path Segments
- Implementation of DCCP for feature negotiation mechanism in Linux pc’s
- Approximate entropy-based epileptic EEG detection using ANN
- User Browsing Behaviors
- A Large-Scale Hidden Semi-Markov Model for Anomaly Detection on
- Stream Switching Resilience Web User-Session Inference by Means of Clustering Techniques
- An Improvement in Apriori algorithm Using Profit And Quantity
- Performance Study on Location-assisted and Bluetooth-assisted Session Transfer for VoIP Application
- mTracker: A Mobile Tracking Application for Pervasive Environment
- Detecting Suspicious Motion with Non-imaging Sensors
- Android, Java ME and Windows Mobile interplay
- Improvement and Its Evaluation of Worker’s Motion Monitor System in Automobile Assembly Factory
- SLA-based Online Charging Model in Mobile Environment
- Implementation of ethercat protocol issues on embedded Linux platform
- Peer-to-Peer Overlay Gateway Services for Home Automation and Management
- Analysis of Anonymity in P2P Anonymous Communication Systems
- A Context Conflict Resolution with Optimized Mediation
- HiTrust: A Hybrid Tree based Trust Negotiation Service
- An Instructional Strategy Selection Model Based on Agent and Ontology for an Intelligent Tutoring System
- Improved Gait Recognition Performance Using Cycle Matching
- Towards a Unified Trust Model in Pervasive Systems
- Quality Metrics for Software Process Certification based on K-model
- An Authentication and Authorization protocol using Ticket in Pervasive Environment.
- Global Top-k Aggregate Queries Based on X-tuple in Uncertain Database
- SAGe: Sensor Advanced Gateway for Integrating Wireless Sensor Networks and Internet
- Tsunami Early Alert and Evacuation Support System for Fishery Workers by Mobile Phones
- Practical Threshold One-Time Proxy Signature Scheme
- Security Verification for Authentication and Key Exchange Protocols, Revisited
- Requirements for Distributed Event-based Awareness in P2P Groupware Systems
- Virtual Database Technology for Distributed Database
- Routing based on Message Attraction
- Effect of Virtual Techniques in Data Storage Access
- Generating Optimum Number of Clusters using Median Search and Projection Algorithms
- Deadline Aware Virtual Machine Scheduler for Grid and Cloud Computing
- Analytical Temporal Specification Issues for Industrial Control Systems
- AWorkflow Fragmentation Framework for Enterprise GridWorkflow Systems
- Knowledge sharing effectiveness measurement
- Enriched Cyberspace through Adaptive Multimedia Utilization for Dependable Remote Collaboration
- Using Ontology for Personalized Mobile Message Computation
- Knowledge sharing effectiveness measurement
- Using Ontology for Personalized Mobile Message Computation
- Analyzing Human Behavior using Case-Based Reasoning with the help of Forensic Questions
- Towards Near Real-Time Data Warehousing
- Grid of Segment Trees for Packet Classification
- Propagation Modeling of Peer-to-Peer Worms
- Automatic Application Signature Construction from Unknown Traffic
- Deployment of a Secure Wireless Infrastructure oriented to Vehicular Networks
- Resist Intruders’ Manipulation via Context-based TCP/IP Packet Matching
- IDSec: an Identification Layer Security Model
- Secure Communication For Internet Payment In Heterogeneous Networks
- Increasing TCP Throughput and Fairness in Cognitive WLAN over Fiber
- Non-Interactive Information Reconciliation for Quantum Key Distribution
- A Quadratic, Complete, and Minimal Consistency Diagnosis Process for Firewall ACLs
- InnoDB Database Forensics
- Controlling File Distribution in The Share Network Through Content Poisoning
- Towards more Trustable Log Files for Digital Forensics by Means of “Trusted Computing”
- HealthPass: Fine-grained Access Control to Portable Personal Health Records
- Environmental Sustainability and Improved Quality of Life Through Service Convergence Technologies
- Using Recommendation to Limit Search Space in Web Services Discovery
- Sink-initiated Geographic Multicasting Protocol in Wireless Sensor Networks
- Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
- Symbolic Routing for Location-based Services in Wireless Mesh Networks
- Energy Constrained Dominating Set for Clustering in Wireless Sensor Networks
- A Dynamic Normalized Weighting based Context Reasoning in Home-based Care
- Web Spambot Detection Based on Web Navigation Behavior
- Key Parameters in Identifying Cost of Spam 2.0
- Empirical Analysis of Attackers Activity on Multi-TierWeb Systems
- Intrusion Tolerant Services Through Virtualization: a Shared Memory Approach
- Against Spyware Using CAPTCHA in Graphical Password Scheme
- MARS: Multi-stage Attack Recognition System
- Context-aware Mobile Services Transactions
- User-Excentric Service Composition in Pervasive Environments
- A Tree Graph Model Based on Mobile Environment
- New Approach to Quantification of Privacy on Social Network Sites
- Trustworthiness among Peer Processes in Distributed Agreement Protocol
- BPE Acceleration Technique for S/W Update for Mobile Phones
- A Secure Key Management Model for Wireless Mesh Networks
- A Novel Cross Layer Intrusion Detection System in MANET
- A Cross-Layer Decision for Mobile IP Handover
- Adaptive Clustering Protocol for Wireless Networks
- An Adaptive Routing Protocol for Bus Networks
- Mapping the Blogosphere with RSS-Feeds
- A DSL-based Approach to Software Development and Deployment on Cloud
- CAPTCHA Using Strangeness in Machine Translation
- Community-Aware Scheduling Protocol for Grids
- Key Agreement in Peer-to-Peer Wireless Networks
- Applying TCP-Friendly Congestion Control to Concurrent Multi-path Transfer
- Schedule Distributed Virtual Machines in a Service Oriented Environment
- Minimizing Execution Costs when using Globally Distributed Cloud Services
- The Taming of the Shrew: Mitigating Low-Rate TCP-Targeted Attack
- Change Scheduling Based on Business Impact Analysis of Change-Related Risk
- Performance Evaluation of Database Designs
- Accountability Computing for e-Society
- A Photonics Based Intelligent Airport Surveillance and Tracking System
- Design of network based software