• How it works

researchprospect post subheader

Useful Links

How much will your dissertation cost?

Have an expert academic write your dissertation paper!

Dissertation Services

Dissertation Services

Get unlimited topic ideas and a dissertation plan for just £45.00

Order topics and plan

Order topics and plan

Get 1 free topic in your area of study with aim and justification

Yes I want the free topic

Yes I want the free topic

Computer Networking Dissertation Topics

Published by Carmen Troy at January 5th, 2023 , Revised On May 16, 2024

A dissertation is an essential aspect of completing your degree program. Whether you are pursuing your master’s or are enrolled in a PhD program, you will not be awarded a degree without successfully submitting a thesis. To ensure that your thesis is submitted successfully without any hindrances, you should first get your topic and dissertation outline approved by your professor. When approving, supervisors focus on a lot of aspects.

However, relevance, recency, and conciseness play a huge role in accepting or rejecting your topic.

As a computer networking student, you have a variety of networking topics to choose from. With the field evolving with each passing day, you must ensure that your thesis covers recent computer networking topics and explores a relevant problem or issue. To help you choose the right topic for your dissertation, here is a list of recent and relevant computer networking dissertation topics.

List Of Trending Ideas For Your Computer Networking Dissertation

  • Machine learning for proactive network anomaly detection 
  • The role of software-defined-networking (SDN) for network performance and security 
  • Applications and challenges of 6G technologies 
  • How to ensure fairness and efficiency in Multi-Access Edge Computing (MEC)
  • Denial-of-Service (DoS) Attacks in the Age of Distributed Denial-of-Service (DDoS) Attacks
  • Applications and rise of Low-Power Wide Area Networks (LPWANs)
  • Efficient Resource Allocation and Quality-of-Service (QoS) Management
  • Ethical Implications of Artificial Intelligence (AI) in Network Management
  • The best ways to use Blockchain for Tamper-Proof Evidence Collection and Storage
  • Role of Network Operators in Cloud Gaming

Computer Networking Dissertation Topics For Your Research

Topic 1: an evaluation of the network security during machine to machine communication in iot.

Research Aim: The research aims to evaluate the network security issues associated with M2M communication in IoT.

 Objectives:

  • To evaluate the factors affecting the network security of IoT devices.
  • To determine the methods for increasing data integrity in M2M communication against physical tampering and unauthorised monitoring.
  • To evaluate the network security issues associated with M2M communication in IoT and offer suitable recommendations for improvement.

Topic 2: An analysis of the cybersecurity challenges in public clouds and appropriate intrusion detection mechanisms.

Research Aim: The aim of the research is to analyse the cybersecurity challenges in public clouds and the appropriate intrusion detection mechanisms.

Objectives:

  • To analyse the types of cybersecurity threats impacting public clouds.
  • To determine some of the competent intrusion detection techniques that can be used in cloud computing.
  • To investigate the cybersecurity challenges in public clouds and offer mitigating with appropriate intrusion detection techniques.

Topic 3: Investigating the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

Research Aim: The research aims to investigate the impact of SaaS cloud ERP on the scalability and cost-effectiveness of business.

  • To analyse the benefits of SaaS ERP over traditional ERP.
  • To evaluate the characteristics of SaaS architecture in cloud computing and determine its varieties.
  • To investigate how SaaS cloud ERP impacts business scalability and cost-effectiveness.

Topic 4: An evaluation of the requirements of cloud repatriation and the challenges associated with it.

Research Aim: The research aims to evaluate the requirements of cloud repatriation in organisations and the associated challenges

  • To analyse the key factors of cloud repatriation.
  • To determine the challenges associated with cloud repatriation from public clouds.
  • To evaluate the need for cloud repatriation in organisations and the associated complexities

Topic 5: An examination of the security mechanisms in decentralised networks and the ways of enhancing system robustness

Research Aim: The research aims to investigate the security mechanisms in decentralised networks and the ways of enhancing system robustness.

  • To analyse the concept of decentralised networks and understand their difference from centralised networks.
  • To analyse the security mechanisms in decentralised networks to determine how it offers visibility and traceability.
  • To investigate the security mechanisms in decentralised networks and how system robustness can be increased for better privacy and security.

Latest Computer Networking Dissertation Topics

Exploring the importance of computer networking in today’s era.

Research Aim: Even though computer networking has been practised for a few years now, its importance has increased immensely over the past two years. A few main reasons include the use of technology by almost every business and the aim to offer customers an easy and convenient shopping experience. The main aim of this research will be to explain the concepts of computer networking, its benefits, and its importance in the current era. The research will also discuss how computer networking has helped businesses and individuals perform their work and benefit from it. The research will then specifically state examples where computer networking has brought positive changes and helped people achieve what they want.

Wireless Networks in Business Settings – An Analysis

Research Aim: Wireless networks are crucial in computer networking. They help build networks seamlessly, and once the networks are set up on a wireless network, it becomes extremely easy for the business to perform its daily activities. This research will investigate all about wireless networks in a business setting. It will first introduce the various wireless networks that can be utilised by a business and will then talk about how these networks help companies build their workflow around them. The study will analyse different wireless networks used by businesses and will conclude how beneficial they are and how they are helping the business.

Understanding Virtual Private Networks – A Deep Analysis of Their Challenges

Research Aim: Private virtual networks (VPN) are extremely common today. These are used by businesses and individuals alike. This research aims to understand how these networks operate and how they help businesses build strong and successful systems and address the challenges of VPNs. A lot of businesses do not adopt virtual private networks due to the challenges that they bring. This research will address these challenges in a way that will help businesses implement VPNs successfully.

A Survey of the Application of Wireless Sensor Networks

Research Aim: Wireless sensor networks are self-configured, infrastructure-less wireless networks to pass data. These networks are now extremely popular amongst businesses because they can solve problems in various application domains and possess the capacity to change the way work is done. This research will investigate where wireless sensor networks are implemented, how they are being used, and how they are performing. The research will also investigate how businesses implement these systems and consider factors when utilising these wireless sensor networks.

Computer Network Security Attacks – Systems and Methods to Respond

Research Aim: With the advent of technology today, computer networks are extremely prone to security attacks. A lot of networks have security systems in place. However, people with nefarious intent find one way to intrude and steal data/information. This research will address major security attacks that have impacted businesses and will aim to address this challenge. Various methods and systems will be highlighted to protect the computer networks. In addition to this, the research will also discuss various methods to respond to attacks and to keep the business network protected.

Preventing a Cyberattack – How Can You Build a Powerful Computer Network?

Research Aim: Cyberattacks are extremely common these days. No matter how powerful your network is, you might be a victim of phishing or hacking. The main aim of this research will be to outline how a powerful computer network can be built. Various methods to build a safe computer network that can keep data and information will be outlined, and the study will also highlight ways to prevent a cyberattack. In addition to this, the research will talk about the steps that should be taken to keep the computer network safe. The research will conclude with the best way and system to build a powerful and safe computer network.

Types of Computer Networks: A Comparison and Analysis

Research Aim: There are different types of computer networks, including LAN, WAN, PAN, MAN, CAN, SAN, etc. This research will discuss all the various types of computer networks to help readers understand how all these networks work. The study will then compare the different types of networks and analyse how each of them is implemented in different settings. The dissertation will also discuss the type of computer networks that businesses should use and how they can use them for their success. The study will then conclude which computer network is the best and how it can benefit when implemented.

Detecting Computer Network Attacks by Signatures and Fast Content Analysis

Research Aim: With technological advancement, today, many computer network attacks can be detected beforehand. While many techniques are utilised for detecting these attacks, the use of signatures and fast content analysis are the most popular ones. This research will explore these techniques in detail and help understand how they can detect a computer network attack and prevent it. The research will present different ways these techniques are utilised to detect an attack and help build powerful and safe computer networks. The research will then conclude how helpful these two techniques are and whether businesses should implement them.

Overview of Wireless Network Technologies and their Role in Healthcare

Research Aim: Wireless network technologies are utilised by several industries. Their uses and benefits have helped businesses resolve many business problems and assisted them in conducting their daily activities without any hindrance. This networking topic will help explore how wireless network technologies work and will talk about their benefits. This research aims to find out how wireless technologies help businesses carry out their daily routine tasks effortlessly. For this research, the focus will be on the healthcare industry. The study will investigate how wireless network technology has helped the healthcare sector and how it has benefited them to perform their daily tasks without much effort.

Setting up a Business Communication System over a Computer Network

Research Aim: Communication is an essential aspect of every business. Employees need to communicate effectively to keep the business going. In the absence of effective communication, businesses suffer a lot as the departments are not synchronised, and the operations are haphazard. This research will explore the different ways through which network technologies help conduct smooth and effective communication within organisations. This research will conclude how wireless networks have helped businesses build effective communication systems within their organisation and how they have benefited from it. It will then conclude how businesses have improved and solved major business problems with the help of these systems.

Free Dissertation Topic

Phone Number

Academic Level Select Academic Level Undergraduate Graduate PHD

Academic Subject

Area of Research

Frequently Asked Questions

How to find computer networking dissertation topics.

To find computer networking dissertation topics:

  • Follow industry news and emerging technologies.
  • Investigate unresolved networking challenges.
  • Review recent research papers.
  • Explore IoT, cybersecurity , and cloud computing.
  • Consider real-world applications.
  • Select a topic aligned with your expertise and career aspirations.

You May Also Like

Need interesting and manageable literature dissertation topics or thesis? Here are the trending literature dissertation titles so you can choose the most suitable one.

Go through some of the dissertation topics related to Forensic science given below, with their research aim, and get an idea to begin your dissertation.

Disasters can potentially be quite dangerous to the continued existence of humans on Earth. Therefore, it is crucial to develop fresh, cutting-edge approaches to managing the damage caused by natural disasters.

USEFUL LINKS

LEARNING RESOURCES

researchprospect-reviews-trust-site

COMPANY DETAILS

Research-Prospect-Writing-Service

  • How It Works

Google Custom Search

Wir verwenden Google für unsere Suche. Mit Klick auf „Suche aktivieren“ aktivieren Sie das Suchfeld und akzeptieren die Nutzungsbedingungen.

Hinweise zum Einsatz der Google Suche

Technical University of Munich

  • Chair of Communication Networks
  • TUM School of Computation, Information and Technology
  • Technical University of Munich

Technical University of Munich

Student Work

We offer students the opportunity to actively participate on interesting and cutting edge research topics and concrete research projects by conducting their thesis in our group.

We offer topics for your Bachelor's Thesis (BA) and Master's Thesis (MA) to successfully complete your studies with a scientific work. We offer students of the Department of Electrical and Computer Engineering to supervise your Forschungspraxis (FP) (research internship /industrial internship) and Ingenieurpraxis (IP) directly at our chair. For students with other specializations, such as Informatics, we offer opportunities to supervise your Interdisciplinary Project (IDP) (German: "Interdisziplinäres Projekt (IDP)"). Please contact us directly for more information.

This page also lists open positions for paid student work in projects (Werkstudent, Studentische Hilfskraft) (SHK).

Please note: For some topics different types of theses are possible. We adapt the goals then to fit the respective requirements and workload (e.g. BA or MA or internship).

Please note: On this page we also list student theses that are already assigned to students (Ongoing Thesis), so you can get an impression on the range of topics that we have at our Chair. Nevertheless, if you are interested in one of the topics of already ongoing theses, please do not hesitate to directly contact the supervisor and ask if there are any plans for follow-up topics. Many times this is actually the case.

Open Thesis

Fp : development of a medical user interface for a telerobotic examination suite.

  • Open thesis as PDF.

Development of a Medical User Interface for a Telerobotic Examination Suite

Description.

networking master thesis

Telediagnostic will help to bring medical expertise in every corner, even in distant rural areas. Hereby, the currently researched 6G communication standard will play a crucial role. Thus, in the scope of the 6G-life project, the aim is to investigate telediagnostic and telerobotic scenarios in detail. Furthermore, capabilities should be demonstrated in practise.

In this research internship, the goal is to develop a User Interface (GUI) for an existing telediagnostic/telerobotic testbed which is provided by our project partner MITI who are located at the hospital "Rechts der Isar" (ca. 20 min. from TUM by bus). In particular, the task is to implement a GUI based on existing UI/UX concepts in such a way a doctor can perform a telerobotic diagnosis using real robotors in the setup. For that, different video streams, medical devices and vital parameters (all already existing) shall be included and shown in the GUI. Furthermore, warnings in dangerous situations shall be shown.

Please note that this research internship is in combination with MITI. As the robotic setup is located there, working at MITI will be needed.

Prerequisites

  • Motivation.
  • Interest in the medical field.
  • Experience in the development of GUIs, especially with Qt/PyQt and video streaming would be nice but are not necessary.

Supervisor:

Ma : investigating the dynamic migration of medical applications in the network, investigating the dynamic migration of medical applications in the network.

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance. For this, the execution location of these applications should be changed dynamically according to the available networking resources.

 In this thesis, the task is therefore to develop and evaluate an approach to optimize the migration of medical applications, i.e., modular application functions (MAFs), when executed in the network. The challenge of this migration lies in the connection quality during the migration and the migration of stateful applications, i.e., using memory.

 The result will be an evaluated placement approach for applications in the medical environment considering the availability.

·       Motivation

·       Ideally some experience in solving optimization problems

·       Basic networking knowledge

·       Basic programming skills

SHK : Working Student for the Implementation of a Medical Testbed

Working student for the implementation of a medical testbed.

Beginning possible from 1st August 2024

Future medical applications put stringent requirements on the underlying communication networks in terms of highest availability, maximal throughput, minimal latency, etc. Thus, in the context of the 6G-life project, new networking concepts and solutions are being developed.

For the research of using 6G for medical applications, the communication and the medical side have joined forces: While researchers from the MITI group (Minimally invasive Interdisciplinary Therapeutical Intervention), located at the hospital "Rechts der Isar", focus on the requirements of the medical applications and collecting needed parameters of patients, it is the task of the researchers at LKN to optimize the network in order to satisfy the applications' demands. The goal of this joint research work is to have working testbeds for two medical testbeds located in the hospital to demonstrate the impact and benefits of future 6G networks and concepts for medical applications.

Your task during this work is to implement the communcation network for those testbeds. Based on an existing open-access 5G network implementation, you will implement changes according to the progress of the current research. The results of your work, working 6G medical testbeds, will enable researchers to validate their approaches with real-world measurements and allow to demonstrate future 6G concepts to research, industry and politics.

In this project, you will gain a deep insight into how communication networks, especially the Radio Access Network (RAN), work and how different aspects are implemented. Additionally, you will understand the current limitations and weaknesses as well as concepts for improvement. Also, you will get some insights into medical topics if interested. As in such a broad topic there are many open research questions, you additionally have the possibility to also write your thesis or complete an internship.

  • Most important: Motivation and willingness to learn unknown things.
  • C/C++ and knowledge about how other programming languages work (Python, etc.) and/or the willingness to work oneself into such languages.
  • Preferred: Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.
  • Initiative to bring in own ideas and solutions.
  • Ability to work with various partners (teamwork ability).

Please note: It is not necessary to know about every topic aforementioned, much more it is important to be willing to read oneself in.

Nicolai Kröger

MA : Mobile Communication RRC Message Security Analysis

Mobile communication rrc message security analysis.

In this topic an analysis of RRC messages in 4G and 5G should be done. There exist several different kind of these messages with different functions and level of information content. The focus should lay on messages related to the connection release. The analysis should consider privacy and security aspects. After the theoretical review and analysis the practical part should focus on an attack. An implementation of one security and privacy aspect should be done as a proof-of-concept with Open Source hard- and software.

The following things are requested to be designed, implemented, and evaluated (most likely via proof-of-concept) in this thesis: • Security and availability analysis of specific RRC messages • Implementation of an attack • Practical evaluation with testing of commercial smartphones

We will offer you: • Initial literature   - https://doi.org/10.14722/NDSS.2016.23236 • Smart working environment • Deep contact to supervisors and a lot of discussions and knowledge exchange

A detailed description of the topics will be formulated with you in initial meetings. For sure, the report needs to be written based on the requirements of the universities, as well as a detailed documentation and handing over the complete project with all sources. Depending on the chosen thesis type the content will be adapted in its complexity.

All applications must be submitted through our application website INTERAMT: https://interamt.de/koop/app/stelle?id=1103974

Carefully note the information provided on the site to avoid any issues with your application.

Please include • a short CV • current overview of your grades • the keyword "T3-MK-RRC" as comment in your application.

For any questions or further details regarding this thesis and the application process, please don't hesitate to contact: • TUM contact: [email protected], [email protected] • Forschungreferat T3 (ZITiS), Email: [email protected]

Knowledge in the following fields is required: • C/C++ Knowledge in the following fields would be an advantage: • Mobile Communication 4G, 5G

• TUM contact: [email protected], [email protected] • Forschungreferat T3 (ZITiS), Email: [email protected]

MA : Mobile Communication Broadcast Message Security Analysis

Mobile communication broadcast message security analysis.

In this topic an analysis of Broadcast messages in 4G and 5G should be done. There exist several different kind of these messages with different functions and level of information content. The analysis should consider privacy and security aspects. After the theoretical review and analysis the practical part should focus on one aspect of the findings. An implementation of one security and privacy aspect should be done as a proof-of-concept with Open Source hard- and software.

The following things are requested to be designed, implemented, and evaluated (most likely via proof-of-concept) in this thesis: • Security and privacy analysis of Broadcast Messages • Implementation of an attack • Practical evaluation with testing of commercial smartphones

We will offer you: • Initial literature - https://dl.acm.org/doi/10.1145/3307334.3326082 • Smart working environment • Deep contact to supervisors and a lot of discussions and knowledge exchange

Please include • a short CV • current overview of your grades • the keyword "T3-MK-BROADCAST" as comment in your application.

FP : Improving network availability- a min cut set approach

Improving network availability- a min cut set approach.

A cut set is a set of components that, by failing, causes the system to fail. A cut set is minimal if it cannot be reduced without losing its status as a cut set.

In this work, we aim to improve network availability based on the mincutsets. We employ graph coloring methods to improve the availability of mincutsets.

Mandatory: Python Communication Network Reliability course, and Integer Linear Programming.

[email protected]

Beginning possible from 1st October 2024

MA : Latency and Reliability Guarantees in Multi-domain Networks

Latency and reliability guarantees in multi-domain networks.

One of the aspects not covered by 5G networks are multi-domain networks, comprising one or more campus networks . There are private networks, including the Radio Access Network and Core Network, not owned by the cellular operators like within a university, hospital, etc. There will be scenarios in which the transmitter is within a different campus network from the receiver, and the data would have to traverse networks operated by different entities.

Given the different operators managing the “transmitter” and “receiver” networks, providing any end-to-end performance guarantees in terms of latency and reliability can pose significant challenges in multi-domain networks. For example, if there is a maximum latency that a packet can tolerate in the communication cycle between the transmitter and receiver, the former experiencing given channel conditions would require a given amount of RAN resources to meet that latency. The receiver, on the other end of the communication path, will most probably experience different channel conditions. Therefore, it will require a different amount of resources to satisfy the end-to-end latency requirement. Finding an optimal resource allocation approach across different networks that would lead to latency and reliability guarantees in a multi-domain network will be the topic of this thesis.     

The approach used to solve these problems will rely on queueing theory. A good knowledge of any programming language is required.

MA , FP , SHK : Decentralized Federated Learning on Constrained IoT Devices

Decentralized federated learning on constrained iot devices.

The Internet of Things (IoT) is an increasingly prominent aspect of our daily lives, with connected devices offering unprecedented convenience and efficiency. As we move towards a more interconnected world, ensuring the privacy and security of data generated by these devices is paramount. That is where decentralized federated learning comes in. Federated Learning (FL) is a machine-learning paradigm that enables multiple parties to collaboratively train a model without sharing their data directly. This thesis focuses on taking FL one step further by removing the need for a central server, allowing IoT devices to directly collaborate in a peer-to-peer manner. In this project, you will explore and develop decentralized federated learning frameworks specifically tailored for constrained IoT devices with limited computational power, memory, and energy resources. The aim is to design and implement efficient algorithms that can harness the collective power of these devices while ensuring data privacy and device autonomy. This involves tackling challenges related to resource-constrained environments, heterogeneous device capabilities, and maintaining security and privacy guarantees. The project offers a unique opportunity to contribute to cutting-edge research with real-world impact. Successful outcomes will enable secure and private machine learning on IoT devices, fostering new applications in areas such as smart homes, industrial automation, and wearable health monitoring. Responsibilities:

  • Literature review on decentralized federated learning, especially in relation to IoT and decentralized systems.
  • Design and development of decentralized FL frameworks suitable for constrained IoT devices.
  • Implementation and evaluation of the proposed framework using real-world datasets and testbeds.
  • Analysis of security and privacy aspects, along with resource utilization.
  • Documentation and presentation of findings in a thesis report, possibly leading to publications in top venues.

Requirements:

  • Enrollment in a Master's program in Computer Engineering, Computer Science, Electrical Engineering or related fields
  • Solid understanding of machine learning algorithms and frameworks (e.g., TensorFlow, PyTorch)
  • Proficiency in C and Python programming language
  • Experience with IoT devices and embedded systems development
  • Excellent analytical skills and a systematic problem-solving approach

Nice to Have:

  • Knowledge of cybersecurity and privacy principles
  • Familiarity with blockchain or other decentralized technologies
  • Interest in distributed computing and edge computing paradigms

Email: [email protected]

MA , IDP , FP , SHK : Attacks on Cloud Autoscaling Mechanisms

Attacks on cloud autoscaling mechanisms.

In the era of cloud-native computing, Kubernetes has emerged as a leading container orchestration platform, enabling seamless scalability and reliability for modern applications.

However, with its widespread adoption comes a new frontier in cybersecurity challenges, particularly low and slow attacks that exploit autoscaling features to disrupt services subtly yet effectively.

This project aims to delve into the intricacies of these attacks, examining their impact on Kubernetes' Horizontal Pod Autoscaler (HPA) and Vertical Pod Autoscaler (VPA), and proposing mitigation strategies for more resilient systems.

Responsibilities :

  • Conduct a thorough literature review to identify existing knowledge gaps and research on similar attacks.
  • Develop methodologies to simulate low and slow attack scenarios on Kubernetes clusters with varying configurations of autoscaling mechanisms.
  • Analyze the impact of these attacks on resource utilization, service availability, and overall system performance.
  • Evaluate current defense mechanisms and propose novel strategies to enhance the resilience of Kubernetes' autoscaling features.
  • Implement and test selected mitigation approaches in a controlled environment.
  • Document findings, present a comparative analysis of effectiveness, and discuss implications for future development in cloud security practices.
  • A strong background in computer engineering, computer science or a related field.
  • Familiarity with Kubernetes architecture and container orchestration concepts.
  • Experience in deploying and managing applications on Kubernetes clusters.
  • Proficiency in at least one scripting/programming language (e.g., Python, Go).
  • Understanding of cloud computing and cybersecurity fundamentals.
  • Prior research or hands-on experience in cloud security, particularly in the context of Kubernetes.
  • Knowledge of network protocols and low-level system interactions.
  • Experience with DevOps tools and practices.

Email: [email protected]

IDP , FP , SHK : Working Student/Research Internship - On-Device Training on Microcontrollers

Working student/research internship - on-device training on microcontrollers.

We are seeking a highly motivated and skilled student to replicate a research paper that explores the application of pruning techniques for on-device training on microcontrollers. The original paper demonstrated the feasibility of deploying deep neural networks on resource-constrained devices, and achieved significant reductions in model size and computational requirements while maintaining acceptable accuracy.

Responsibilities:

  • Extend our existing framework by implementing the pruning techniques on a microcontroller-based platform (e.g., Arduino, ESP32)
  • Replicate the experiments described in the original paper to validate the results
  • Evaluate the performance of the pruned models on various benchmark datasets
  • Compare the results with the original paper and identify areas for improvement
  • Document the replication process, results, and findings in a clear and concise manner
  • Strong programming skills in C and Python
  • Experience with deep learning frameworks (e.g., TensorFlow, PyTorch) and microcontroller-based platforms
  • Familiarity with pruning techniques for neural networks is a plus
  • Excellent analytical and problem-solving skills
  • Ability to work independently and manage time effectively
  • Strong communication and documentation skills

SHK : Working Student - Machine Learning Serving on Kubernetes

Working student - machine learning serving on kubernetes.

We are seeking an ambitious and forward-thinking working student to join our dynamic team working at the intersection of Machine Learning (ML) and Kubernetes. In this exciting role, you will be immersed in a cutting-edge environment where advanced ML models meet the power of container orchestration through Kubernetes. Your contributions will directly impact the development and optimization of scalable and robust ML serving systems leveraging the benefits of Kubernetes.

If you are a student passionate about both Machine Learning and Kubernetes, we invite you to join us on this exciting journey! We offer the chance to pioneer cutting-edge solutions that leverage the power of these two transformative technologies.

  • Collaborate with a cross-functional team to design and implement ML workflows on Kubernetes.
  • Assist in packaging and deploying ML models as microservices using containers (Docker) and managing them effectively through Kubernetes.
  • Optimize resource allocation, scheduling, and scaling strategies for efficient model serving at varying workloads.
  • Implement monitoring solutions specific to ML inference tasks within the Kubernetes cluster.
  • Troubleshoot and debug issues related to containerized ML applications
  • Document best practices, tutorials, and guides on leveraging Kubernetes for ML serving
  • Currently enrolled in a Bachelor's or Master's program in School of CIT
  • Strong programming skills in Python with experience in software development lifecycle methodologies.
  • Familiarity with machine learning frameworks such as TensorFlow and PyTorch.
  • Proficiency in container technologies. Docker and Kubernetes certification would be a plus but not mandatory.
  • Experience with cloud computing platforms; e.g., AWS, GCP or Azure.
  • Demonstrated ability to work independently with effective time management and strong problem-solving analytical skills.
  • Excellent communication and teamwork capabilities.
  • Kubernetes Certification: Having a valid Kubernetes certification (CKA, CKAD, or CKE) demonstrates your expertise in container orchestration and can be a significant advantage.
  • Experience with DevOps and/or MLOps Tools: Familiarity with MLOps tools such as MLflow, Kubeflow, or TensorFlow Extended (TFX) can help you streamline the machine learning workflow and improve collaboration. Experience with OpenTelemetry, Jaeger, Istio, and monitoring tools is a plus.
  • Knowledge of Distributed Systems: Understanding distributed systems architecture and design patterns can help you optimize the performance and scalability of your machine learning models.
  • Contributions to Open-Source Projects: Having contributed to open-source projects related to Kubernetes, machine learning, or MLOps demonstrates your ability to collaborate with others and adapt to new technologies.
  • Familiarity with Agile Methodologies: Knowledge of agile development methodologies such as Scrum or Kanban can help you work efficiently in a fast-paced environment and deliver results quickly.
  • Cloud-Native Application Development: Experience with cloud-native application development using frameworks like Cloud Foundry or AWS Cloud Development Kit (CDK) can be beneficial in designing scalable and efficient machine learning workflows.

IDP : Working Student for the Edge AI Testbed

Working student for the edge ai testbed.

We are seeking a highly motivated and enthusiastic Working Student to join our team as part of the Edge AI Testbed project. As a Working Student, a key member of our research team, you will contribute to the development and testing of cutting-edge Artificial Intelligence (AI) systems at the edge of the network. You will work closely with our researchers and engineers to design, implement, and evaluate innovative AI solutions that can operate efficiently on resource-constrained edge devices. Responsibilities:

  • Assist in designing and implementing AI models for edge computing
  • Develop and test software components for the Edge AI Testbed
  • Collaborate with team members to integrate AI models with edge hardware platforms
  • Participate in performance optimization and evaluation of AI systems on edge devices
  • Contribute to the development of tools and scripts for automated testing and deployment
  • Document and report on project progress, results, and findings

If you are a motivated and talented student looking to gain hands-on experience in Edge AI, we encourage you to apply for this exciting opportunity!

  • Strong programming skills in languages such as Python and C++
  • Experience with AI frameworks such as TensorFlow, PyTorch, or Keras
  • Familiarity with edge computing platforms and devices (e.g., Raspberry Pi, NVIDIA Jetson)
  • Basic knowledge of Linux operating systems and shell scripting
  • Excellent problem-solving skills and ability to work independently
  • Strong communication and teamwork skills
  • Experience with containerization using Docker
  • Familiarity with cloud computing platforms (e.g., Kubernetes)
  • Experience with Apache Ray
  • Knowledge of computer vision or natural language processing
  • Participation in open-source projects or personal projects related to AI and edge computing

MA , IDP , FP , SHK : An AI Benchmarking Suite for Microservices-Based Applications

An ai benchmarking suite for microservices-based applications.

In the realm of AI applications, the deployment strategy significantly impacts performance metrics.

This research internship aims to investigate and benchmark AI applications in two predominant deployment configurations: monolithic and microservices-based, specifically within Kubernetes environments.

The central question revolves around understanding how these deployment strategies affect various performance metrics and determining the more efficient configuration. This inquiry is crucial as the deployment strategy plays a pivotal role in the operational efficiency of AI applications.

Currently, the field lacks a comprehensive benchmarking suite that evaluates AI applications from an end-to-end deployment perspective. Our approach includes the development of a benchmarking suite tailored for microservice-based AI applications.

This suite will capture metrics such as CPU/GPU/Memory utilization, interservice communication, end-to-end and per-service latency, and cache misses.

  Requirements:

  • Familiarity with Kubernetes
  • Familiarity with Deep Learning frameworks (e.g., PyTorch or TensorFlow)
  • Basics of computer networking

MA , FP , SHK : Performance Evaluation of Serverless Frameworks

Performance evaluation of serverless frameworks.

Serverless computing is a cloud computing paradigm that separates infrastructure management from software development and deployment. It offers advantages such as low development overhead, fine-grained unmanaged autoscaling, and reduced customer billing. From the cloud provider's perspective, serverless reduces operational costs through multi-tenant resource multiplexing and infrastructure heterogeneity.

However, the serverless paradigm also comes with its challenges. First, a systematic methodology is needed to assess the performance of heterogeneous open-source serverless solutions. To our knowledge, existing surveys need a thorough comparison between these frameworks. Second, there are inherent challenges associated with the serverless architecture, specifically due to its short-lived and stateless nature.

MA : Investigation of Flexibility vs. Sustainability Tradeoffs in 6G

Investigation of flexibility vs. sustainability tradeoffs in 6g.

5G networks brought significant performance improvements for different service types like augmented reality, virtual reality, online gaming, live video streaming, robotic surgeries, etc., by providing higher throughput, lower latency, higher reliability as well as the possibility to successfully serve a large number of users. However, these improvements do not come without any costs. The main consequence of satisfying the stringent traffic requirements of the aforementioned applications is excessive energy consumption.

Therefore, making the cellular networks sustainable, i.e., constraining their power consumption, is of utmost importance in the next generation of cellular networks, i.e., 6G. This goal is of interest mostly to cellular network operators. Of course, while achieving network sustainability, the satisfaction of all traffic requirements, which is of interest to cellular users, must be ensured at all times. While these are opposing goals, a certain balance has to be achieved.

In this thesis, the focus is on the type of services known as eMBB (enhanced mobile broadband). These are services that are characterized as latency-tolerant to a certain extent, but sensitive to the throughput and its stability. Live video streaming is a use case falling into this category. For these applications, on the one side, higher data rates imply higher energy consumption. On the other side, the users can be satisfied with slightly lower throughput as long as the provided data rate is constant, which corresponds to the flexibility that the network operator can exploit. Hence, the question that needs to be answered in this thesis is what is the optimal trade-off between the data rate and the energy consumption in a cellular network with eMBB users? To answer this question, the entire communication process will be encompassed, i.e., from the transmitting user through the base station and core network to the receiving end. The student will need to formulate an optimization problem to address the related problem, which they will then solve through exact optimization solvers, but also through proposing simpler algorithms (heuristics) that reduce the solution time while not considerably deteriorating the system performance.

  • Good knowledge of any programming language
  • Good mathematical and analytical thinking skills
  • High level of self-engagement and motivation

[email protected]

[email protected]

IDP , FP : Assessing the suitability of Multipath TCP and QUIC for LiFi-WiFi networks

Assessing the suitability of multipath tcp and quic for lifi-wifi networks.

In order to fully utilize the capabilities of a LiFi-WiFi network, user devices should be capable of using multiple network interfaces simultaneously. Thanks to multipath solutions like MPTCP and MPQUIC, this is possible. The challenge in a multipath-enabled heterogeneous network lies in designing a policy to schedule data packets onto the multiple paths with heterogeneous characteristics (eg. delay, packet loss). The goal of this work is to compare and evaluate various multipath transport protocols on a LiFi-WiFi testbed and assess their suitability for heterogeneous wireless networks by analyzing the advantages and limitations of each protocol.

Related Reading:

  • P. S. Kumar, N. Fatima and P. Saxena, "Performance analysis of Multipath Transport layer schedulers under 5G/B5G hybrid networks," 2022 14th International Conference on COMmunication Systems & NETworkS (COMSNETS), Bangalore, India, 2022, pp. 658-666, doi: 10.1109/COMSNETS53615.2022.9668483.
  • Q. De Coninck and O. Bonaventure, "MultipathTester: Comparing MPTCP and MPQUIC in Mobile Environments," 2019 Network Traffic Measurement and Analysis Conference (TMA), Paris, France, 2019, pp. 221-226, doi: 10.23919/TMA.2019.8784653.
  • T. Schmidt, J. Deutschmann, K. -S. Hielscher and R. German, "POSTER: Revisiting Multipath QUIC Experiments and Comparing them with more recent Multipath TCP Implementations," 2021 IEEE International Symposium on Local and Metropolitan Area Networks (LANMAN), Boston, MA, USA, 2021, pp. 1-2, doi: 10.1109/LANMAN52105.2021.9478815.

If you are interested in this work, please send me an email with a short introduction of yourself along with your CV and grade transcript.

  • Experience with Linux networking
  • Strong foundation in wireless networking concepts
  • Availability to work in-presence

FP : Mobility-aware resource allocation in multipath LiFi-WiFi networks

Mobility-aware resource allocation in multipath lifi-wifi networks.

In order to fully utilize the capabilities of a LiFi-WiFi network, user devices should be capable of using multiple network interfaces simultaneously. Thanks to multipath solutions like MPTCP and MPQUIC, this is possible. The challenge in a multipath-enabled heterogeneous network lies in designing a resource allocation scheme to manage resources of both technologies resulting in an optimal network. The goal of this work is to develop a resource allocation framework in a python simulator to assign the users to access points and allocate wireless resources of both technologies to maximize the throughput of the network. The resource allocation scheme would be developed using multi-agent reinforcement learning and should be compared to an analytical scheme such as  Lagrangian optimization and an “optimal” scheme implemented with an off the shelf solver like Gurobi.

  • D. Frometa Fonseca, B. Genoves Guzman, G. Luca Martena, R. Bian, H. Haas and D. Giustiniano, "Prediction-model-assisted reinforcement learning algorithm for handover decision-making in hybrid LiFi and WiFi networks," in Journal of Optical Communications and Networking, vol. 16, no. 2, pp. 159-170, February 2024, doi: 10.1364/JOCN.495234.
  • F. Jin, R. Zhang and L. Hanzo, "Resource Allocation Under Delay-Guarantee Constraints for Heterogeneous Visible-Light and RF Femtocell," in IEEE Transactions on Wireless Communications, vol. 14, no. 2, pp. 1020-1034, Feb. 2015, doi: 10.1109/TWC.2014.2363451.
  • Experience with programming in Python
  • Experience with reinforcement learning
  • Motivation to learn optimization concepts

MA : Network Planning in the Medical Context

Network planning in the medical context.

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance.

 In this thesis, the task is to develop and evaluate an approach to dimension networking resources such as networking devices and processing units depending on the envisioned medical applications to be executed. This work is in cooperation with our partners at MITI (Hospital „Rechts der Isar“).

 The result will be an approach to dimension and plan networks for future medical applications. 

·       Ideally some experience in optimization problems

MA : Optimizing the Availability of Medical Applications

Optimizing the availability of medical applications.

 In this thesis, the task is to develop and evaluate an approach to optimize the availability  of medical applications, i.e., modular application functions (MAFs), when executed in the network. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications while considering the needed availability.

MA : Minimizing the Power Consumption of Medical Applications

Minimizing the power consumption of medical applications.

 In this thesis, the task is to develop and evaluate an approach to minimize the power consumptions  of medical applications, i.e., modular application functions (MAFs), when executed in the network. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications while considering the power consumption.

 The result will be an evaluated power minimizing approach for applications in the medical environment.

MA : In-Network Placement of Medical Applications

In-network placement of medical applications.

 In this thesis, the task is to place medical applications, i.e., modular application functions (MAFs), in the networking considering various parameters similar to [1]. For that, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The optimizing approach then leads to a specified distribution of the processing and networking resources, considering various important parameters.

 The result will be an evaluated placement approach for applications in the medical environment.

[1] A. Hentati, A. Ebrahimzadeh, R. H. Glitho, F. Belqasmi and R. Mizouni, "Remote Robotic Surgery: Joint Placement and Scheduling of VNF-FGs," 2022 18th International Conference on Network and Service Management (CNSM) , Thessaloniki, Greece, 2022, pp. 205-211, doi: 10.23919/CNSM55787.2022.9964591.

MA : Processing Priorization of MAF Chains in the Medical Context

Processing priorization of maf chains in the medical context.

In future communication systems such as 6G, in-network computing will play a crucial role. In particular, processing units within the network enable to run applications such as digital twins close to the end user, leading to lower latencies and overall better performance. However, these processing resources are usually shared among many applications, which potentially leads to worse performance in terms of execution time, throughput, etc. . This is especially critical for applications such as autonomous driving, telemedicine or smart operations. Hence, the processing of more critical applications must be prioritized.

 In this thesis, the task is to develop and evaluate a priorization approach for chains  of modular medical applications, i.e., modular application functions (MAFs). Hereby, this work extends an already existing work, focusing on the placement of only single MAFs with prioritization. In this work, suitable real use cases are identified together with our partners at MITI (Hospital "Rechts der Isar"). The priorization approach then leads to a specified distribution of the processing and networking resources, satisfying the minimum needs of critical applications.

 The result will be an evaluated priorization approach for applications in the medical environment.

BA , IDP , FP , IP , SHK : Intel's IPU: Starting from the beginning

Intel's ipu: starting from the beginning.

Intel develops Network Devices consisting of an FPGA and a general purpose processor. These are the so called IPUs. The goal of this Thesis/Position is to get such an IPU (Intel IPU F2000X) up and running and evaluates its potential. Here, the goal is to program a custom IPU application and evaluate metrics like latency, throughput, and many more under varying circumstances.

  • Basic Knowledge Linux Terminal
  • Basic Knowledge C/C++
  • Basic Knowledge of and about FPGAs

BA , IDP , FP , SHK : DPU as Measurement Cards and Load Generators

Dpu as measurement cards and load generators.

Datacenters experience higher and more demanding Network Loads and Traffic. Companies like Nvidia developed special networking hardware to fulfill these demands (The Nvidia Bluefield Line-Up). These cards promise high throughput and high precision. The features required to achieve such tasks can also be used to use Bluefield Cards as potential measurement cards or as load generators.

The goal of this Thesis/Position is to evaluate the performance and feasibility of this approach

For more information, please contact me directly ([email protected])

  • Basic Knowledge Python

BA , MA , IDP , FP , SHK : Advancing Real-time Network Simulations to Real World Behaviour

Advancing real-time network simulations to real world behaviour.

Testing real-time application and networks is very timing sensitive. It is very hard to get this precision and accuracy in the real-world. However, the real-world itself also behaves different then simualtions. Our Simulator behaves like the theory dictates and allows us to get these precise timing, but needs to be tested and exteded to behave more like a real-network would

Requirements

  • Knowledge of NS-3
  • Knowledge of Python
  • Knowledge of C/C++

Please contact me for more information ([email protected])

FP , SHK : Working Student - Real-Time Network Controller for Research

Working student - real-time network controller for research.

Chameleon is a real-time network controller that guarantees packet latencies for admitted flows. However, Chameleon is designed to work in high performance environments. For research and development, a different approach that offers more debugging and extension capablites would suit us better.

  • Create Real-time Network Controller
  • Controller needs to be easy to debug
  • Controller needs to be easy to extend
  • Controller needs to have good logging and tracing
  • Advanced Knowledge of C/C++
  • Advanced Knowledge of Python

Amaury Van Bemten, Nemanja Ðeri?, Amir Varasteh, Stefan Schmid, Carmen Mas-Machuca, Andreas Blenk, and Wolfgang Kellerer. 2020. Chameleon: Predictable Latency and High Utilization with Queue-Aware and Adaptive Source Routing. In The 16th International Conference on emerging Networking EXperiments and Technologies (CoNEXT ’20), December 1–4, 2020, Barcelona, Spain. ACM, New York, NY, USA, 15 pages. https://doi.org/10.1145/3386367. 3432879

BA , MA , IDP , FP , SHK : Controlling Stochastic Network Flows for Real-time Networking

Controlling stochastic network flows for real-time networking.

Any data that is sent in a real-time network is monitored and accounted for. This allows us with the help of some mathematical frameworks to calculate upper bounds for the latency of the flow. These frameworks and controllers often consider hard real-time guarantees. This means that every packet arrives in time every time. With soft real-time guarantees, this is not the case. Here, we are allowed to have some leeway

In this thesis, we want to explore how we can model and admit network flows that have a stochastical nature.

Please contact me for more information ([email protected])!!

SHK : Working Student: Framework for Testing Realtime Networks

Working student: framework for testing realtime networks.

Testing a Network Controller, custom real-time protocols, or verifying simulations with emulations requires a lot of computing effort. This is why we are developing a framework that helps you run parallel networking experiments. This framework also increases the reproducibility of any networking experiment.

The main Task of this position is to help develop the general-purpose framework for executing parallel networking experiments.

  • Continue developing the Framework for multi server / multi app usage
  • Extend Web Capabilities of the Framework
  • Automate Starting and Stopping
  • Ease-of-use Improvements
  • Test the functionality
  • Basic Knowledge of Web-App Development (FastApi, React etc...)
  • Basic Knowledge of System Architecture Development

Feel free to contact me per mail ([email protected])

SHK : Working Student Infrastructure Service Management

Working student infrastructure service management.

We are seeking a highly motivated and detail-oriented Working Student to join our data center team. As a Working Student, you will assist in the daily operations of our data center, gaining hands-on experience in a fast-paced and dynamic environment.

  Assist with regular data center tasks, such as.

  • Rack and Stack equipment
  • Cable Management and organization
  • Perform basic troubleshooting and maintenance tasks
  • Assist with inventory management
  • Monitor data center systems and report any discrepancies or issues
  • Create the basis for our Data Center Infrastructure Management
  • Develop and maintain documentation of data center procedures and policies
  • Perform other duties as required to support the data center operations
  • Availability to work 8 - 10 hours per week with flexible scheduling to accommodate academic commitments
  • Basic knowledge of computer systems, networks, and data center operations
  • Basic knowledge in Python

SHK : Working Student for Analysis, Modeling and Simulation of Communication Networks SS2024

Working student for analysis, modeling and simulation of communication networks ss2024.

The primary responsibilities of a working student include assisting tutors in correcting programming assignments and answering questions in Moodle. Working time is 6-7 hours per week in the period from May to July.

  • Python knowledge

[email protected]

SHK : Student Assistent for Wireless Sensor Networks Lab Winter Semester 24/25

Student assistent for wireless sensor networks lab winter semester 24/25.

The Wireless Sensor Networks lab offers the opportunity to develop software solutions for the wireless sensor networking system, targeting innovative applications. For the next semester, a position is available to assist the participants in learning the programming environment and during the project development phase. The lab is planned to be held on-site every Tuesday 15:00 to 17:00.

  • Solid knowledge in Wireless Communication: PHY, MAC, and network layers.
  • Solid programming skills: C/C++.
  • Linux knowledge.
  • Experience with embedded systems and microcontroller programming knowledge is preferable.

[email protected]

[email protected]

SHK : Development of a GUI for Monitoring and Debugging a Digital Twin of QKD Networks

Development of a gui for monitoring and debugging a digital twin of qkd networks.

We search for a student to build a GUI, simplifying analysis and interaction with the network emulator. The emulator is based on Containernet and includes QKD-specific network function virtualization. Currently, distributed routing is supported but will be extended by centralized routing. Monitoring data from active QKD-links are fed in to mirror realistic circumstances.

  • Build a front-end displaying performance and operational data
  • Build a GUI for dynamically changing secret key rates 
  • Programming skills in Python
  • Experience in front-end web development
  • Interest in security and practical concepts of guaranteed security

Mario Wenning [email protected]

BA , MA , IDP , FP , SHK : Distributed Deep Learning for Video Analytics

Distributed deep learning for video analytics.

In recent years, deep learning-based algorithms have demonstrated superior accuracy in video analysis tasks, and scaling up such models; i.e., designing and training larger models with more parameters, can improve their accuracy even more.

On the other hand, due to strict latency requirements as well as privacy concerns, there is a tendency towards deploying video analysis tasks close to data sources; i.e., at the edge. However, compared to dedicated cloud infrastructures, edge devices (e.g., smartphones and IoT devices) as well as edge clouds are constrained in terms of compute, memory and storage resources, which consequently leads to a trade-off between response time and accuracy. 

Considering video analysis tasks such as image classification and object detection as the application at the heart of this project, the goal is to evaluate different deep learning model distribution techniques for a scenario of interest.

MA , IDP , FP , SHK : Edge AI in Adversarial Environment: A Simplistic Byzantine Scenario

Edge ai in adversarial environment: a simplistic byzantine scenario.

This project considers an environment consisting of several low performance machines which are connected together across a network. 

Edge AI has drawn the attention of both academia and industry as a way to bring intelligence to edge devices to enhance data privacy as well as latency. 

Prior works investigated on improving accuracy-latency trade-off of Edge AI by distributing a model into multiple available and idle machines. Building on top of those works, this project adds one more dimension: a scenario where $f$ out of $n$ contributing nodes are adversary. 

Therefore, for each data sample an adversary (1) may not provide an output (can also be considered as a faulty node.) or (2) may provide an arbitrary (i.e., randomly generated) output.

The goal is to evaluate robustness of different parallelism techniques in terms of achievable accuracy in presence of malicious contributors and/or faulty nodes.

Note that contrary to the mainstream existing literature, this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although robustness of the training phase can be considered as well, it has a much lower priority.

BA , MA , IDP , FP , SHK : On the Efficiency of Deep Learning Parallelism Schemes

On the efficiency of deep learning parallelism schemes.

Deep Learning models are becoming increasingly larger so that most of the state-of-the-art model architectures are either too big to be deployed on a single machine or cause performance issues such as undesired delays.

This is not only true for the largest models being deployed in high performance cloud infrastructures but also for smaller and more efficient models that are designed to have fewer parameters (and hence, lower accuracy) to be deployed on edge devices.

That said, this project considers the second environment where there are multiple resource constrained machines connected through a network. 

Continuing the research towards distributing deep learning models into multiple machines, the objective is to generate more efficient variants/submodels compared to existing deep learning parallelism algorithms.  

Note that this project mainly focuses on the inference (i.e., serving) phase of deep learning algorithms, and although efficiency of the training phase can be considered as well, it has a much lower priority.

MA , IDP , FP , SHK : Optimizing Distributed Deep Learning Inference

Optimizing distributed deep learning inference.

The rapid growth in size and complexity of deep learning models has led to significant challenges in deploying these architectures across resource-constrained machines interconnected through a network. This research project focuses on optimizing the deployment of deep learning models at the edge, where limited computational resources and high-latency networks hinder performance. The main objective is to develop efficient distributed inference techniques that can overcome the limitations of edge devices, ensuring real-time processing and decision-making. The successful candidate will work on addressing the following challenges:

  • Employing model parallelism techniques to distribute workload across compute nodes while minimizing communication overhead associated with exchanging intermediate tensors between nodes.
  • Reducing inter-operator blocking to improve overall system throughput.
  • Developing efficient compression techniques tailored for deep learning data exchanges to minimize network latency.
  • Evaluating the performance of proposed modifications using standard deep learning benchmarks and real-world datasets.
  • Implement and evaluate various parallelism techniques, such as model parallelism and variant parallelism, from a communication efficiency perspective.
  • Identify and implement mechanisms to minimize the exchange of intermediate tensors between compute nodes, potentially using advanced compression techniques tailored for deep learning data exchanges.
  • Conduct comprehensive performance evaluations of proposed modifications using standard deep learning benchmarks and real-world datasets. Assess improvements in latency, resource efficiency, and overall system throughput compared to baseline configurations.
  • Write technical reports and publications detailing the research findings.
  • Pursuing a Master's degree in School of CIT
  • Strong background in deep learning, distributed systems, and parallel computing.
  • Proficiency in Python and experience with deep learning frameworks (e.g., TensorFlow, PyTorch).
  • Excellent problem-solving skills and the ability to work independently and collaboratively as part of a team.
  • Strong communication and writing skills for technical reports and publications.

SHK : Working student for the PCN lab

Working student for the pcn lab.

Th e Prgrammable Communication Networks lab offers the opportunity to work with interesting and entertaining projects related to the Software-Defined Networking (SDN) and Programmable Data Planes (PDP) paradigms. For the next semester, a position is available to assist on the lab doing the student supervision during the lab sessions.

  • Solid knowledge in computer networking (TCP/IP, SDN, P4)
  • Solid knowledge of networking tools and Linux (iperf, ssh, etc)
  • Good programming skills: C/C++, Python

Please send your transcript of recrods and CV to: Cristian Bermudez Serna - [email protected]

Nicolai Kröger - [email protected]

Ongoing Thesis (already assigned)

Bachelor's theses, implementation and stochastic evaluation of a chemical reaction network for successive interference cancellation in molecular communication networks.

Molecular communication (MC) is a novel communication paradigm envisioned to enable revolutionary future medical and biological use cases such as in-body networks for the diagnosis and treatment of diseases. MC is based on the transport of molecules for information exchange and represents a very energy-efficient and bio-compatible communication mechanism on the centimeter to nanometer scale. The communication nodes can be very small as they will be based on artificial cells or other types of tiny nano-machines.

In order to realize complex applications, such as targeted drug delivery or the detection and localization of infections and tumors, nano-machines must cooperate and communicate. The specific properties and mechanisms in biological environments and at very small scales lead to several challenges:

  • Novel channel models and conditions based on diffusion and flow of molecules.
  • Extremely slow speeds compared to electromagnetic waves.
  • Highly stochastic behavior of the molecules.
  • Low capability of future nano-machines, not able to conduct complex computations or sophisticated algorithms.

Therefore, research on MC  networks  is crucial to enable a future internet of bio-nano things (IoBNT) integrating classical and molecular networks.

In this thesis, the student will work on the topic of chemical reaction networks (CRNs), which represent a possible substrate for computations and programmability in biological systems. A CRN is built from a number of coupled chemical reactions and is designed to turn a certain concentration of input molecules into a concentration of output molecules.

The student will be tasked with implementing a CRN that approximates a real signal processing algorithm, namely successive interference cancellation (SIC). SIc could be used, for example, to realize non-orthogonal multiple access schemes in a larger MC network. 

The CRN will be designed conceptually and implemented using Python. Then, the CRN will be evaluated rigorously using both deterministic solvers based on differential equations, as well as stochastic simulations that take into account individual random molecule interactions.

_Bachelor‘s Thesis Autoencoder Optimized Error Concealment for Semantic Video Conferencing

Semantic communication enables communication of discrete symbols. Even when a proportion of symbols are lost, an appropriate synthesis of the intended meaning is possible. Error concealment attempts to minimize the impact of errors (symbol loss), by approximating lost symbols. This thesis applies machine-learning to the hypothesis that: If semantic symbols are lost, given first order motion model video conferencing, then, with the aid of mutual information, temporal information, and the structure of semantic symbols, machine learning can be used to create an error concealment technique more performant than an algorithmic technique, because the patterns in the data are more complex than easily captureable algorithmically.

Handover with PMIPv6 in LDACS

This thesis will focus on the next generation air to ground communication standard: LDACS. It specifically discusses the IP Layer of the LDACS and mobility mechanisms behind it which enable a seamless handover for the aircraft.

Implementation and Evaluation of a Particle-Based Simulator for Molecular Communication with Diffusion and Flow

Implement a particle-based simulation framework for molecular communication networks:.

Use e.g. Python or MATLAB

Main target scenario: cylindrical tube with multiple transmitters and receivers

Effects: Diffusion, laminar/uniform flow -> output: particle trajectories

Enable different types of transmitters and receivers (e.g. point, cross-sectional distribution, volume) Flexibility in placement of TX and RX and shape of the initial molecules distribution  

Implement and evaluate a non-orthogonal multiple access scheme based on the distance and the emitted number of molecules from each TX

Experimental evaluation of xapp-related vulnerabilities in the o-ran's ran intelligent controller implementation.

In previous mobile network generations, Radio Access Networks (RAN) have been treated as a proprietary, closed network segment that is specific to every operator. To accelerate development and innovation, new initiatives such as the O-RAN ALLIANCE were born, aiming to split the RAN into different components and standardize the open interfaces that connect them.

Fundamentally, O-RAN leverages the concept of Software Defined RAN (SD-RAN) by decoupling the RAN data plane from the control plane and introducing several new RAN-controlling components. One of the central components is the near real-time RAN Intelligent Controller (nearRT-RIC), which manages the RAN (network slices, handovers, etc). The nearRT-RIC is designed to allow both the use of traditional, rule-based policies and Machine Learning or data-driven ones to optimize the RAN operation. The logic of these policies is encapsulated in applications called xApps that run on the nearRT-RIC platform and can read and modify different parameters of the RAN.

While providing opportunities for efficient resource management, the nearRT-RIC is also a prospective target for attackers, because of its control power over the RAN. Specifically, an attack vector is a malicious xApp that can interfere with other legitimate xApps running on the nearRT-RIC.  

NearRT-RIC implementations are still in their infancy and suffer from bugs and security vulnerabilities. These vulnerabilities are also prevalent in open-source implementations such as O-RAN Software Community's (OSC) RIC [1], where malicious xApps may disrupt the nearRT-RIC operation. The H Release of the OSC nearRT-RIC suffers from two major vulnerabilities that can compromise the operation of the RIC and crash it [2]. Additionally, a crafted packet sent by an xApp can crash memcpy and implicitly the whole OSC nearRT-RIC [3]. Such vulnerabilities significantly hinder the wide-scale adoption and deployment of O-RAN.

The goal of this student thesis is to reproduce the attacks discussed in [2] and [3] for the newer OSC nearRT-RIC I Release. Additionally, after reproducing the existing attacks and understanding the OSC RIC Platform, the student is expected to explore new attack attempts with the same goal of disrupting OSC nearRT-RIC. Special focus will be put on the critical components of the system, such as the Subscription Manager and Subscription Procedures, Routing Message Router, other xApps, and O1/A1/E2 Terminations.

[1] “O-RAN SC Projects,” https://docs.o-ran-sc.org/en/latest/projects.html#near-realtime-ran-intelligent-controller-ric , accessed: 2024-04-19.

[2] Hung, C.F., Chen, Y.R., Tseng, C.H., & Cheng, S.M. (2024). Security Threats to xApps Access Control and E2 Interface in O-RAN. IEEE Open Journal of the Communications Society, 5, 1197-1203.

[3] "Opening Critical Infrastructure: The Current State of Open RAN Security,” https://www.trendmicro.com/en us/research/23/l/the-current-state-of-open-ran-security.html , accessed: 2024-04-19.

- Experience with Docker and Kubernetes

- Linux Knowledge

- C/C++ Knowledge is a plus

- Razvan-Mihai Ursu ([email protected])

Dynamic Security Analysis in 5G RAN

The mobile security sector has uncovered numerous vulnerabilities within link and session-establishment protocols. These vulnerabilities can be exploited using software-defined radios (SDRs) to interfere with, impersonate, or flood layer-3 (L3) messages, compromising security and privacy. These risks persist even within the latest 5G mobile network standard. With affordable SDRs and open-source cellular software stacks readily accessible, the economic and technical obstacles to practical cellular attacks are relatively minimal. In this work, we would like to investigate the resource depletion and Denial-of-Service (DoS) attacks, that are well known in LTE [1], within 5G RAN. The main focus will be regarding the RRC and NAS protocol vulnerabilities that are mentioned in [1]. The expected results would be to recreate these attacks experimentally in our 5G RAN with srsRAN [2]. If time allows, further tests can be performed over campus network with commercial 5G RAN.

[1] H. Kim, J. Lee, E. Lee and Y. Kim, "Touching the Untouchables: Dynamic Security Analysis of the LTE Control Plane," 2019 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 2019, pp. 1153-1168, doi: 10.1109/SP.2019.00038.

[2] I. Gomez-Miguelez et al., “Srslte: An open-source platform for lte evolution and experimentation,” in Proc. of ACM WiNTECH, 2016.

- C/C++ experience

- SDR experience is a plus

- 5G knowledge is a plus

- Serkut Ayvasik ([email protected])

- Nicolai Kroeger ([email protected])

Towards Improving Class Parallelism for Edge Environments

Main-stream serving paradigms for distributed models, such as data parallelism and model parallelism, are not suitable when it comes to inference for tasks that require low latency and have atomic input streams. A recent effort, Sensai, proposes a new generic approach called class parallelism that aims to distribute a base convolution neural network (CNN) model across several homogeneous machines.

    The model distribution paradigm decomposes a CNN into disconnected subnets, each responsible for predicting specific classes or groups of classes. They claim that this approach enables fast, in-parallel inference on live data with minimal communication overhead, significantly reducing inference latency on single data items without compromising accuracy.

    Class Parallelism, however, comes with its own set of challenges and limitations. For instance, since the generated models should be created in a homogeneous manner; they share similar characteristics. Further, regardless of the input, all sub-models have to be executed to get the final prediction, which directly impacts the robustness and scalability of the system.

    During the first stage of the thesis, our goal is to reproduce the results from the paper. Later, we want to improve the existing method to become more robust and possibly extend it to new use cases besides image classification. Finally, if time permits, we want to evaluate the trained models in an edge environment.

Investigation of Various Resource Allocation Granularities in the Frequency Domain of a 5G Radio Access Network

Resource efficiency is a key design principle for future 6G radio systems. To achieve resource efficiency, a high resource utilization must be accomplished. This can be realized by allocating exactly the number of resources to the various users, which are required by them. The number of required resources per user highly depends on the experienced channel conditions of a user, which can be determined by the Channel Quality Indicator (CQI) in the Downlink (DL). To determine the CQIs, reference signals are sent by the Base Station (BS) and the CQI is periodically reported by the User Equipemt (UE). CQI reporting can either be done for the entire Bandwidth Part (BWP), i.e., wideband CQI reporting, or for a subgroup of frequency resources, i.e., subband CQI reporting. In 5G Radio Access Networks (RANs), the unit of resource allocation in the frequency domain is a Resource Block Group (RBG), which consists of multiple Physical Resource Blocks (PRBs). The number of PRBs that make up a single RBG is fixed and depends on the employed Bandwidth Part (BWP) size [1]. Since the CQI determines how much data can be sent with a single RBG, it highly influences the number of required resources of a user. Hence, the accuracy and the granularity of the CQI in terms of the frequency spectrum impacts the overall resource utilization that can be achieved. Furthermore, the number of PRBs making up one RBG influences the achieved resource utilization, as the difference between the number of allocated resources and the number of required resources decreases with a decreasing level of granularity.   The goal of this thesis is to investigate the trade-off between a higher CQI reporting granularity, which comes with an increased signaling overhead, and the increased resource efficiency by achieving a better mapping between the actual channel conditions and the reported CQI value. Moreover, the impact of smaller RBG sizes should be compared against the increase in signaling overhead allowing for a more granular resource allocation. To this end, first, the student needs to gain a thorough understanding of the DL reference signals and CQI reporting in 5G as well as the DL resource allocation. This can be achieved by a detailed study of the ETSI 5G standards. Afterwards, the student is expected to conduct extensive simulations for different parameter settings to numerically evaluate the different trade-offs. Optionally, depending on the thesis progress, a similar analysis can be conducted for an UL setup or measurements can be conducted in a testbed setup that uses OpenAirInterface (OAI) [2].

[1] ETSI, “5G; NR; phyiscal layer procedures for data: 3GPP TS 38.214 version 17.5.0 release 17.” www.etsi.org, 2023. Technical Specification. [2] Open Air Interface, “OpenAirInterface | 5G software alliance for democratising wireless in- novation,” 2024. https://openairinterface.org [Accessed: January 31, 2024].

Improving network availability- adding links

This work aims to find the best links that, when added to the network, improve the network availability.

Communication Network Reliability course, Python, Integer Linear Programming

Modeling and implementation of quantum entangled photon sources

What are the different models for quantum entangled photon sources and how can they be implemented in a quantum networks simulator?

Data plane performance measurements

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding devices which are instructed by the controller on how to forward traffic.

P4 is a domain-specific programming language, which can be used to define the functionality of forwarding devices as virtual or hardware switches and SmartNICs.

This work consists on performing measurements for a given P4 code on different devices. For that, an small P4-enabled virtual network will be used to perform some measurments. Later, data will be also collected from hardware devices as switchs and SmartNICs. Measurement should be depicted in a GUI for its subsequent analysis.

Basic knowledge on the following:

  • Networking/SDN
  • Web programming (GUI).

Please send your CV and transcript of records.

[email protected]

Measuring the Throughput of quantized neural networks on P4 devices

Implement a quantized neural network in P4 and evaluate the throughput of feed-forward networks and networks with attention mechanisms on P4 hardware.

An SCTP Load Balancer for Kubernetes to aid RAN-Core Communication

Cloud Native deployments of the 5G Core network are gaining increasing interest and many providers are exploring these options. One of the key technologies that will be used to deploy these Networks, is Kubernetes (k8s). In 5G, NG Application Protocol (NGAP) is used for the gNB-AMF (RAN-Core) communication. NGAP uses SCTP as a Transport Layer protocol. In order to load balance traffic coming from the gNB towards a resilient cluster of AMF instances, a L4 load balancer needs to be deployed in the Kubernetes Cluster. The goal of this project is do develop a SCTP Load Balancer to be used in a 5G Core Network to aid the communication between the RAN and Core. The project will be developed using the language Go (https://golang.org/).

- General knowledge about Mobile Networks (RAN & Core). - Good knowledge of Cloud Orchestration tools like Kuberentes. - Strong programming skills. Knowledge of Go (https://golang.org/) is a plus.

[email protected]

Development of an East/West API for SD-RAN control communication

Software-Defined Radio Access Network (SD-RAN) is receiving a lot of attention in 5G networks, since it offers means for a more flexible and programmable mobile network architecture.

The heart of the SD-RAN architecture are the so called SD-RAN controllers. Currently, initial prototypes have been developed and used in commercial and academic testbeds. However, most of the solutions only contain a single SD-RAN controller. Nonetheless, a single controller becomes also a single point of failure for a system, not only due to potential controller failures but also due to a high load induced from the devices in the data plane.

To this end a multi-controller control plane often becomes a reasonable choice. However, a multi-controller control plane renders the communication among the controllers more challenging, since they need to often exchange control information with each other to keep an up to date network state. Unfortunately, currently there is no protocol available for such a communication.

The aim of this work is the development and implementation of an East/West API for SD-RAN controller communication according to 5G stardardization. The protocol should enable the exchange of infromation among the SD-RAN controllers regarding UEs, BSs, wireless channel state and allow for control plane migration among controllers.

  • Experience with programming languages Python/C++.
  • Experience with socket programming.
  • Knowledge about SDN is a must.
  • Knowledge about 4G/5G networks is a plus.

Master's Theses

Analysis and optimization of fiber-to-the-room mac protocols.

The widespread deployment of Fiber-to-the-Home (FttH) in various markets has given consumers access to high-speed data connections over the extensive optical fiber-based core networks. End users usually access these networks with wireless devices using the 802.11 standard. However, as the next generation of IoT devices with VR and AI applications enter the market, the demand for improved bandwidth and latency has increased drastically. This has led to the development of Fiber-to-the-Room (FttR) networks, which seek to extend the fiber connections closer to the terminal devices by eliminating the bottleneck caused by traditional ethernet and wireless access. Current implementations utilize a cascaded XGPON optical distribution network (ODN) in convergence with WiFi 6. The ONU at the user’s premises is replaced with a Main FttR Unit (MFU), which acts as the OLT for the Sub FttR Units (SFU) in each room using point-to-multipoint architecture. The SFUs convert the optical signals to baseband and retransmit the data as WiFi frames. These solutions keep both MAC and PHY layers between the optical transport and WiFi completely separated without using any synergies. This introduces various limitations to the FttR setup, such as degraded data rates, jitter / latency, and high power consumption. To solve these problems, a centralized wireless - optical access network (C-WAN) has been conceptualized, where the MFU becomes a central controller to enable seamless roaming, with deterministic low latency transmission and gigabit coverage for the entire room. Within the scope of this solution, a cross-domain MAC layer between optical and WiFi has been proposed to implement dynamic resource management and scheduling. Such a centralized and converged MAC protocol must reduce overhead and optimize the framing of both physical layers to minimize the processing delay at the SFUs. This thesis aims to design and evaluate such a minimal optical access protocol with a centralized controller and test its performance in an FttR setup. The ns-3 network simulator is used within the context of this thesis to implement, simulate, and analyze the designed protocol with C++. Extensive modules that simulate both XGPON and WiFi 6 are already implemented in ns-3 and can be modified as required.

Analysing the 5G Roaming Control Plane Connections and Evaluating their Security Capabilities

5G is the newest generation of mobile networks, allowing for higher data rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). One of these NFs is responsible for roaming connections. Roaming allows subscribers to connect to the internet via other network operators’ networks if they have a roaming agreement. Between two Public Land Mobile Networks (PLMNs) there are two standardised roaming modes: Local Break Out and Home Routed Roaming.

A major part of both roaming modes is the Security Edge Protection Proxy (SEPP), a 5G NF designed to establish and maintain a secure control plane connection between two PLMNs. Implementing it, or extending the existing implementation of Open5GS, will be an important part of this work. The SEPP is connected to other NFs in the same PLMN via Service Based Interfaces (SBIs) and to other PLMN’s SEPPs via the N32 interface.

Two SEPPs connections are divided into the N32-c and N32-f interfaces. Via N32-c, the connection is established and the security capabilities of N32-f are negotiated. All control messages between NFs of the visited and the home PLMN are transmitted via N32-f. While N32-c is secured with an end-to-end Transport Layer Security (TLS) connection, N32-f either uses the same security or, alternatively, a new 5G protocol named PRotocol for N32 INterconnect Security (PRINS). PRINS uses end-to-end application layer encryption and additionally hop-to-hop TLS encryption. While one direct TLS connection is more secure, it relies on a direct link between both parties. Considering a roaming scenario with two countries separated by multiple thousand kilometres, direct links are not always feasible. Alternatively, two PLMNs are connected via IP Exchange Networks (IPXs). To be able to route the packets reliably to their respective destinations, the IPX providers have to have access to the packets’ data. PRINS aims to provide security for this option by using the Javascript Object Signing and Encryption (JOSE) framework.

This work aims to implement N32-c and both options for the N32-f interface and investigate their differences regarding security, operability, and performance.

Basic understanding of 5G networks advantageous; especially of the 5G core network

– interest and motivation to learn the system are sufficient

  • Programming knowledge in C useful (for Open5GS)
  • Interest in roaming functionalities and their security

Oliver Zeidler ( [email protected] )

Implementing and Evaluating 5G Roaming Scenarios in an Open Source Testbed

5G is the newest generation of mobile networks, allowing for higher data rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). One of these NFs is responsible for roaming connections. Roaming allows subscribers to connect to the internet via other network operators’ networks if they have a roaming agreement. Between two Public Land Mobile Networks (PLMNs), there are two standardised Roaming modes: Local Break Out and Home Routed Roaming. For Local Break Out Roaming, only the home network’s control plane is accessed from the visited network, while the user data is directly transmitted to the Data Network (DN). For Home Routed Roaming, the user data is routed through the home network to the DN. This thesis aims to implement both Roaming versions in an open-source core network and compare them regarding chosen KPIs, e.g., latency or throughput. Open5GS would be the primary choice for the open-source core network, as it already supports Local Break Out Roaming. Home Routed Roaming is not yet supported.

A major part of 5G roaming is the Security Edge Protection Proxy (SEPP), a 5G NF designed to establish and maintain a secure control plane connection between two PLMNs. Implementing it, or extending the existing implementation of Open5GS, will be an important part of this work. The SEPP is connected to other NFs in the same PLMN via Service Based Interfaces (SBIs) and to other PLMN’s SEPPs via the N32 interface.

The biggest difference between the two roaming scenarios lies in the data plane routing, so implementing the connection between two User Plane Functions (UPFs), the N9 interface, is necessary to connect two PLMNs. The newly introduced Inter PLMN User Plane Security (IPUPS) used for additional security on this connection is initially considered out-of-scope for this work but may be added later.

A security analysis regarding control and user plane for both roaming modes finishes this work’s contributions. Potential focal points are the control capabilities of the home PLMN operator in Local Break Out Roaming.

• Basic understanding of 5G networks advantageous; especially of the 5G core network

  • interest and motivation to learn the system are sufficient

• Programming knowledge in C useful (for Open5GS)

• Interest in Roaming functionalities

• Interest in security would be nice, but is not needed (not the main focus of the work

Oliver Zeidler ([email protected])

Julian Sturm ([email protected])

Combined Scheduling of PSFP and TAS

Time Sensitive Networking (TSN) provides a variety of different mechanisms providing real-time communication. Especially, TSN is able to transmit periodic time-triggered traffic with strict real-time requirements. This thesis focuses on the time-aware shaper (TAS) standardized in IEEE 802.1Qbv and the per-stream filtering and policing (PSFP) mechanism defined in IEEE 802.1Qci. The goal is to develop an algorithm combining a TAS and a PSFP schedule. The TAS schedule should be secured by a time-based PSFP schedule. The PSFP schedule should drop frames or reduce their priority which are not matching the expected arrival interval. The algorithm has to be evaluated in a testbed considering traffic scenarios with multiple time-triggered streams.

VM Selection for Financial Exchanges in the Cloud

Financial exchanges consider a migration to the cloud for scalability, robustness, and cost-efficiency. Jasper presents a scalable and fair multicast solution for cloud-based exchanges, addressing the lack of cloud-native mechanisms for such.

To achieve this, Jasper employs an overlay multicast tree, leveraging clock synchronization, kernel-bypass techniques, and more. However, there are opportunities for enhancement by confronting the issue of inconsistent VM performance within identical instances. LemonDrop tackles this problem, detecting under-performing VMs in a cluster and selecting a subset of VMs optimized for a given application's latency needs. Yet, we believe that LemonDrop's approach of using time-expensive all-to-all latency measurements and an optimization routine for the framed Quadratic Assignment Problem (QAP) is overly complex. 

The proposed work aims to develop a simpler and scalable heuristic, that achieves reasonably good results within Jasper's time constraints. 

Towards Improving Model Generation in Variant Parallelism

Resource constraints of edge devices serve as a major bottleneck when deploying large AI models in edge computing scenarios. Not only are they difficult to fit into such small devices, but they are also quite slow in inference time, given today's need for rapid decision-making. One major technique developed to solve this issue is Variant Parallelism. In this ensemble-based deep-learning distribution method, different main model variants are created and deployed in separate machines, and their decisions are combined to produce the final output. 

    The method provides graceful degradation in the presence of faulty nodes or poor connectivity while achieving an accuracy similar to the base model.

    However, the technique used to generate variants can fail in scalability as combining variants of smaller size with somewhat identical characteristics may not help achieve a significant accuracy boost unless they are retrained with different random seeds. Therefore, this research will focus on improving variant parallelism by exploring other ways to generate variants. We will apply knowledge distillation (KD), where a teacher model of a certain type (e.g., ResNet-50) can be used to train a smaller student model or a model of a completely different structure (e.g., MobileNet). 

    We aim to develop a variant generation technique where we can generate as many variants as there are participating devices while boosting accuracy and inference speed. Additionally, we will create an optimization scenario that dynamically creates a smaller student model based on specific requirements, such as hardware characteristics and end-to-end performance metrics.

Possibilities of Localization Mechanisms in a 5G Lab Environment

Mobile networks have long provided mechanisms for localization. This capability has been improved with LTE and new features in 5G allow even better positioning.

While some positioning methods are hard to recreate in a lab environment (such as AoA), others are possible (e.g. E-CID). One goal is to identify which can be recreated on-site.

Additionally, not much is known about the prevalence of support for these localization mechanisms.

According to their documentation, the Amarisoft Callbox supports the NL1-Interface between an external LMF and the built-in AMF. This can be used for an early prototype.

Minimum goals:

·         Implement LMF that is able to interact with Amarisoft Callbox over NL1

·         Evaluate which localization methods are suitable for lab-based testing

·         Evaluate the prevalence of advertised localization mechanisms in commercial UEs

·         Evaluate the implementation status of localization mechanisms in commercial UEs

·         Evaluate if results can be explained by OS, Baseband or other factors

·         Find and evaluate possible attacks on the UEs location privacy

Extended goals:

·         Implement LPP into Open5GS with AmariRAN or Open5GS with OAI

·         Implement Demo into the 5GCube framework

Planning and Evaluation of Unbalanced and Balanced PON for Rural Areas

With the increasing need for broadband in rural areas and the shift towards fiber-based Passive Optical Networks (PON), this research will focus on the deployment strategies of Balanced PON (BPON) and Unbalanced PON (UPON). The aim is to enhance efficiency and minimize infrastructure costs associated with broadband deployment. Recognizing the high expense associated with fiber deployment, especially in rural areas where geographical and demographic factors pose significant challenges, this study will focus on a shift from the conventional BPON approach, characterized by uniform power splitting (e.g., 1:16 or 1:32 splitting), to a more adaptable UPON strategy. The UPON architecture facilitates variable power splitting ratios, enhancing network reach and optimizing the distribution of network resources—such as bandwidth and optical power—in rural areas, where the distances between Optical Network Units (ONUs) or customer premises are greater than those in urban settings.

The methodology includes gathering detailed rural area data from OpenStreetMap to simulate realistic network designs, including the strategic placement of Optical Line Terminals (OLTs), splitters, and Optical Network Units (ONUs). The research will compare the traditional BPON, both single and cascading splitting, against UPON in terms of fiber length utilization, network elements placement strategy, power distribution efficiency, and overall cost-effectiveness. By using Gabriel graphs to generate rural area networks and analyzing PON equipment parameters like transmitted power range, sensitivity, and fiber attenuation, this research will be dedicated to identifying the most efficient, unprotected, optical access network configurations for rural settings. The research will also consider the potential of merging BPON and UPON strategies, aiming to harness the combined benefits of both architectures for a more versatile and cost-effective rural broadband deployment.

This comparative analysis is expected to keen insights into the scalability of BPON and UPON solutions, guiding network operators toward more informed infrastructure development decisions in rural settings. By analyzing multiple Gabriel graphs to evaluate total fiber length, splitter requirements, and infrastructure cost, this research aims to derive comprehensive guidelines for efficient fiber deployment in rural areas. These guidelines will contribute to internet access deployment strategies and help narrow the digital divide, showcasing UPON as an affordable and practical solution for rural broadband. By aligning with initiatives like the Broadband Programs in Germany and Bavaria, this research underscores the global effort to extend high-quality internet connectivity to underserved areas. [1] This analysis will thus empower network operators with the knowledge to select the most appropriate PON configuration for rural deployments, ensuring efficient, reliable, and affordable broadband access.

References:

[1] "State aid: Commission approves German scheme for very high capacity broadband networks in Bavaria." The European Sting, 29 Nov. 2019, https://ec.europa.eu/commission/presscorner/detail/en/ip_19_6630.

Knowledge of:

  • Object Oriented Programming
  • Optical Networks

Electrical Network and Optical Network Dependability

The dependability that the electrical and optical networks have on each other is a critical factor in ensuring uninterrupted services to the large population of the landscape of urban infrastructure. This thesis aims to delve into the complexity of different protection schemes in optical networks and explore their interconnection with electrical networks through different kinds of failures. The motivation behind this thesis comes from the increasing reliance on digital and electrical services, making the importance of the robustness of the underlying infrastructure very critical. Additionally, the focus will be on urban areas due to their large number of population and complex infrastructural needs.

Protection schemes

Optical networks are backbone technologies that provide telecommunication services to urban areas and to safeguard these networks from failures and ensure continuity, different protection schemes are implemented.

  • Unprotected scheme: Basic configuration without any backup paths for the feeder fiber, leaving the network vulnerable to service disruptions.
  • Type A Protection (Feeder Fiber Protection): Incorporates a backup path for the feeder fiber's working path, enhancing reliability.
  • Type B Protection (Dual Parented): Each subscriber is connected to two Optical Line Terminals (OLTs) located in different geographical areas. This setup provides a secondary OLT as a backup, significantly reducing the risk of service interruption.
  • Type C Protection: Offers complete redundancy with two independent links extending to the subscriber's location, ensuring the highest level of network reliability.

The initial phase of this thesis involves mapping these protection schemes onto real-world urban layouts using OpenStreetMap data and Python scripting.

Failure Analysis and Impact Assessment

A critical aspect of network dependability is understanding how networks respond to failures and for this reason, this thesis implements different types of failures.  

  • Node Failure: Focuses on the failure of Optical Line Terminals (OLTs) and Remote Nodes (RNs), excluding Optical Network Units (ONUs) since their failure impacts are isolated.
  • Edge Failure: Involves simulating failures of all network connections (edges) to assess the extent of impact on ONUs.
  • Disaster Failure: Examines the effects of large-scale disasters, using a defined centroid and radius, to determine the number of affected ONUs within the disaster zone.

To explain the impacts on network functionality and ONUs, for each failure type the thesis will present visualizations and statistical analysis like boxplots or histograms. Interdependence with Electrical Networks Parallel to the exploration of optical networks, this thesis will study power network topologies, design constraints, and requirements necessary for integrating electrical network functionalities into the same urban layouts. Similar to the optical network, will simulate various power network failures and analyze their impacts on ONU connectivity. This approach aims to highlight and enhance the mutual dependability between electrical and optical networks, thereby increasing overall system robustness against failures.

All the work in this thesis is based on a combination of advanced scripting, data analysis libraries, and geospatial data sources to achieve its objectives. The primary tools and technologies used are Python, OpenStreetMap (OSM), and Python libraries. Some Python libraries are NetworkX which is used for creating and studying the structure of complex networks, and Pandas which is crucial for managing and analyzing the large datasets generated from OpenStreetMap and network simulations. Matplotlib and Seaborn to create static and interactive visualizations in Python.

A Novel Sparse dMIMO Transmission Scheme for Efficient Data Communication

For 6G radio systems it is key to achieve high capacity, coverage and energy efficiency. Distributed massive MIMO (dMIMO) systems are one of the often proposed 6G concepts to help to achieve these challenging requirements. dMIMO is very similar to a JT CoMP system, which has been researched for many years even so the reported performance gains over classical mMIMO systems are typically small to moderate. There are a number of well known challenges like the high inter cooperation area interference, channel aging for a high number of involved radio channels, or, huge processing complexity due to the large size of the channel matrices for a high number of cooperating transmission points. To overcome at least some of these issues a novel so called ‘sparse’ dMIMO system has been proposed, where the conventional transmission of user data is replaced by a novel ‘start stop bit’ transmission scheme. The main feature is the sparse resource usage for data transmissions, which is interesting for dMIMO systems as it can help to significantly reduce the inter cooperation area interference by potentially 98%. Similarly, the complexity for the dMIMO precoding might be reduced by potentially 98% as most of the resource elements of a physical resource block will be set to zero, i.e., do not need any precoding. The scope of the master thesis is to evaluate the novel 6G sparse dMIMO concept, verify the claimed benefits, identify new challenges and potential new implementation concepts overcoming these challenges. Where useful, AI/ML based solutions should be applied to achieve highest performance with lowest complexity.

Evaluation of Time Offset in 5G NR using USRPs

The 3GPP standard has established a maximum time synchronization error, the indoor 5G network may be able to handle a higher value proposed by an earlier simulation. To validate and determine such a result, it is necessary to use real hardware to create a small network and test related aspects of it. Upper error limits serve a useful purpose in many network applications. The developer is able to establish the maximum permissible error by the network requirements to aid in the construction of networks.

RTT-guided Route Servers at IXPs

Problem: BGP is performance-agnostic

Solution: incorporate a delay-related metric into the best-path selection process.

Approach: Estimate the round-trip prop_delay to destinations (/24s) within the routing table of the IXP

Goal: Evaluate if it is possible to outperform BGP’s route selection criterion, in terms of latency, with a measurement-based approach.

LFM Deep Dive: Understanding the Impact on 5G

Linkability of Failure Messages (LFM) is a security hole in the Authentication and Key Agreement (AKA) procedure.

The LFM flaw was first reported in 3G [2] and it has also been proven to work in 5G [1]. Compared to IMSI catchers, the use of the flaw for identifying nearby subscribers has two limitations: First, the attacker has to know the ID of a person of interest that they are looking for. Only these subscribers with known IDs can be detected, it is not possible to find the ID of a new subscriber without knowing / guessing it.

Second, LFM requires an attacker to probe every new device that connects to their fake base station for every ID that they are looking for. In addition to probing every new device, the attacker also needs to contact an authentic mobile network to obtain authentication requests for each person of interest.

Due to these limitations, the LFM flaw is less powerful than previously used IMSI catchers. The objective of this project is to examine the scalability and practicability of exploiting the flaw on a larger scale.

Network Programmability-based Security Mechanisms in Optical Access Networks

The advent of Software-Defined Networking (SDN) has revolutionized the way networks are managed and secured. In the context of optical access networks, where performance and security are paramount, it is crucial to develop advanced mechanisms for safeguarding against threats like TCP-SYN flood attacks. This research proposal aims to investigate a novel approach to thwarting such attacks, leveraging SDN controllers and programmable switches, specifically in optical access networks. How can SDN controllers and programmable switches be employed to effectively detect and mitigate TCP-SYN flood attacks in optical access networks, utilizing authentication using a modified SYN-ACK exchange and actuating triggers, while maintaining network performance and reliability? This research aims to contribute to the field of network security and SDN by providing a cutting-edge solution for mitigating TCP-SYN flood attacks in optical access networks. The expected outcomes include: 1. An innovative approach to SYN flood attack mitigation, leveraging SYN-ACK exchange and P4-based actuating triggers. 2. Insights into the performance and scalability of the proposed solution in optical access network scenarios. 3. A comprehensive evaluation of alternative SYN flood attack mitigation techniques, aiding network administrators in selecting the most appropriate method.

  • Machine Learning
  • Python and P4 programming
  • Knowledge of Softrware-Defined Networking

Exploration of Machine Learning for In-network Prediction and Classification

Software defined networks (SDN) have made data traffic routing a lot more convenient. The functionality of the additional controller can be used e.g. for detecting network threats like DoS or also for load balancing by redirecting data traffic. The initial idea of SDNs is that each time a new packet enters the network the packet is first forwarded to the controller to be checked. The controller then decides on which route the packet shall be send inside the network or tells the network to drop the packet, for instance if it is a threat. Each of the switches then save this information in their match-action tables. However, this model cannot scale in large networks with thousands or even millions of different packets trafficking, since that would lead to an additional latency, if every single packet needs to be sent to the controller.

Therefore, a promising solution to improve the model is to include a Machine Learning algorithm into the process. Specifically, Decision Trees (DT) and Random Forests (RF) can be used to do this line-rate classification. Since Decision Trees do not require complex mathematical operations, they can be easily deployed into the programmable switches using P4 language. Either a per-packet or a per-flow approach, each with its advantages and its drawbacks, will automate the decision of the switch of how to handle the incoming traffic instead of always forwarding it first to the controller.

In this master thesis a realisation of a DT into the P4 switches will be tested. First a functioning DT based on a real data traffic dataset will be implemented. Both variations (per-packet/per-flow) will be taken into consideration. The second step will be to translate the algorithm into the P4 switches. Afterwards the prediction performance will be analysed. The final step will be to compare the ML approach to the non-ML approach and draw conclusions on the results.

Performance Evaluation of a 6G UAM Connected Sensor Fusion System

The master thesis aims to develop a connected sensor fusion system focusing on its application in Urban Air Mobility localization. By gathering data from multiple sensors, the air vehicles (AVs) will be able to better estimate the airspace view and improve their route planning.  The performance of IoT protocols within the context of a 6G system will be assessed. The study also seeks to evaluate the impact of network performance factors, such as delay and packet loss, on the accuracy of the fusion data. Additionally, the thesis will investigate the impact of a semantic-aware transport layer on the performance of the fusion system. Ultimately, the research not only contributes to the advancement of UAM technology but also aligns with the emerging 6G paradigm, offering a more connected and efficient solution for tactical deconfliction in airspace navigation, making it safer and more reliable.

Remote Monitoring of Correlated Sources Over Random Access Channels in IoT Systems

The thesis studies a Markov model of two correlated sources (X and Y) transmitting the data over a wireless channel for remote estimation. The objective of the thesis is to develop a strong theoretical insight for modelling an estimator to optimize the errors and age of information in a wireless communication system. We aim at studying various estimation strategies to do so, and demonstrate the optimal method for the given conditions (such as correlation between the sources, and Markov model parameters). The implementation is carried out by simulating the abovementioned theoretical concepts in MATLAB under different conditions.

Analysis of UE-initiated Signaling Storms and Their Impact on 5G Network Security

Signaling storm is a specific type of DDoS attack, which emerges from frequent small-scale signaling activities of a group of compromised UE. Typically, signaling messages are exchanged between UE and the network for establishing communication sessions and managing network resources. However, signaling attacks abuse regular procedures to generate high number of signaling messages within a short period. The generation of excessive signaling load increases the network congestion and consumes resources. In 5G, UEs must send a request to initiate themselves and establish the communication with the 5G core. These initial registration request messages contain UE related information about identity, location and capabilities. The recent research internship focused on signaling storms has revealed that an initial registration request flood can generate significant signaling load and stress the network core. In the scope of mentioned internship, a simulation environment was created using UERANSIM and open5GS to investigate the impact of repetitive initial registration requests from a botnet comprising hundreds of UEs on control plane resources. The master thesis involves a comprehensive research study based on this initial observation to identify other signaling attack scenarios initiated by UEs, that abuse regular UE signaling for registration processes, inter-slice handovers and mobility handovers. Furthermore, assessing the impact of these scenarios and exploring possible detection methodologies are crucial for the intended study.

Motivation: 5G networks are designed to be used for three types of connected services: Enhanced Mobile Broadband(eMBB), Ultra Reliable Low Latency Communications (URLLC) and Massive Machine Type Communications (mMTC). Higher throughput, reliable connections and low latency capabilities of 5G networks should meet uninterrupted and robust data exchange requirements of users. Both the industry and individual users heavily rely on seamless connectivity. However, numerous studies have shown that 5G networks are vulnerable to signaling threats and DDoS attacks, which are becoming more severe due to the growing number of mobile and IoT devices. Such attacks can increase latency and impact service availability. The majority of literature on this topic examines potential 5G threats including signal storms and their effect on users. Even some detection and prevention techniques have been proposed. Although these studies provide valuable information about signaling storms, it has not been particularly investigated how control plane resources can be exploited by flooding UE initiated and 5G protocol specific requests. The research gap regarding concrete statements to reproduce signaling attacks is the main motivation of this study.

Objectives and Research Question: This work will focus on UE initiated DDoS attacks targeting control plane resources of 5G networks and it will question if these attacks can have a severe impact on practical 5G test setup. Therefore, signaling procedures particularly the ones involving NAS and NGAP protocols, will be explored to identify scenarios for UE initiated signaling attacks. The characteristics of the identified scenarios will be derived by theoretical analysis. The remaining objectives are reproducing these scenarios conducting experiments with appropriate simulation tools, evaluating the impact of these attacks on the network and user experience and investigating detection solutions for signaling storms.

Challenges: The identified scenarios should be demonstrated and analyzed to study the research question, which poses two main challenges. Designing a simulation environment for realistic attack reproduction is elaborate, which requires determining the most suitable solution to simulate UE, gNB and 5GC among existing solutions. The simulation environment cannot completely replace the real 5G network and there will be some restrictions. Therefore, the second challenge is to design experiments in a way that allows the derivation of general statements about 5G security threats from observations made during the experiments

Contribution: This thesis will address the signaling attacks on the control plane of 5G networks by identifying concrete signaling scenarios to generate excessive packet floods, analyzing them, and demonstrating them to assess their impact on the network. The simulation environment will allow reproducing various attacks to derive characteristics of the attacks, which are required for detection by distinguishing between good and malicious communication patterns. Overall, this work will contribute to the improvement of network security.

Proactive load-aware wireless resource allocation for sustainable 6G network

The rapid growth of traffic and the number of connected devices in the 5G and beyond wireless networks focus the attention on sustainability in the radio access network (RAN). Traffic load and status of available wireless resources in the network change rapidly, especially in scenarios with a large number of connections and high mobility. The high connectivity is caused by exponentially increasing Internet of Things (IoT) devices connected to the network for supporting various use cases ranging from Industry 4.0 to healthcare. IoT devices mainly powered by batteries are characterized by low cost, low complexity, and limited computational resources. Therefore, elongating their lifetime while fulfilling the quality of service (QoS) requirements poses a new research challenge. To tackle this problem, context awareness of devices consisting of device type and mobility; and the network traffic load simultaneously enhance the wireless resource management and the management of the devices states. Moreover, to enable awareness of the neighboring cells, the predicted information on the traffic load can be exchanged among cells. The above affects the decisions of accepting the device or offloading it to the neighboring cell and the device's operating state. In this thesis, the student will focus on developing and testing a context-aware resource allocation mechanism based on device mobility and traffic load, focusing on decreasing individual devices' energy consumption and reducing processing latency.

  • Good knowledge of Python and Matlab programming.
  • Good mathematical background.
  • Knowledge of mobile networks.

[email protected]

Sustainable Edge Network Orchestration in 5G with Performance Guarantees

With the advent of 5G cellular networks, more stringent types of traffic, pertaining to applications like augmented reality, virtual reality, and online gaming, are being served nowadays. However, this comes with an increased energy consumption on both the user’s and network side, challenging this way the sustainability of cellular networks. Furthermore, the in-network computing aspect exacerbates things even further in that direction. 

Hence, it is very important to provide end-to-end sustainability, i.e., minimize the energy consumption in the network while maintaining performance guarantees, such as the maximum latency each flow should experience. This can be done, for example, depending on the traffic load in the network, and in order to keep the energy usage at low levels, the operator can decide to shut off certain network components, like User Plane Functions (UPFs) or edge clouds, and reassign the tasks to other entities. 

In this thesis, the focus will be on the core network. The aforementioned decisions will come up as solutions to optimization problems. To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver (e.g., Gurobi). The other part would be conducting realistic simulations and showing the improvements with our approach. 

- Basic understanding of 5G Core Networks and Mobile Edge Computing (MEC).

- Experience with mathematical formulation of optimization problems.

- Programming experience with Python and Gurobi.

The Analysis of Dual Data Gathering Strategy for Internet-of-Things Devices in Status Update Systems

The analysis of a dual data-gathering strategy for Internet-of-Things (IoT) devices in status update systems offers valuable insights into improving the efficiency and reliability of data collection in IoT environments. This thesis focuses on investigating the dual data gathering strategy, aiming to optimize the performance of status update systems in IoT deployments. The dual data-gathering strategy takes advantage of both local and remote processing capabilities. Using different source servers, this strategy aims to reduce energy consumption and network congestion in status update systems. The anticipated outcomes of this research include a comprehensive understanding of the dual data gathering strategy, mathematical models to analyze its performance, and insights into its practical implementation. These outcomes will not only advance the theoretical understanding of status update systems in IoT but also have practical implications for the design and deployment of IoT networks and applications.

Load Generation for Benchmarking Kubernetes Autoscaler

Kubernetes (K8s) has become the de facto standard for orchestrating containerized applications. K8s is an open-source framework which among many features, provides automated scaling and management of services. 

Considering a microservice-based architecture, where each application is composed of multiple independent services (usually each service provides a single functionality), K8s' Horizontal Pod Autoscaler (HPA) can be leveraged to dynamically change the number of  instances (also known as Pods) based on workload and incoming request pattern.

The main focus of this project is to benchmark the HPA behavior of a Kubernetes cluster running a microservice-based application having multiple services chained together. That means, there is a dependency between multiple services, and by sending a request to a certain service, other services might be called once or multiple times.

This project aims to generate incoming request load patterns that lead to an increase in either the operational cost of the Kubernetes cluster or response time of the requests. This potentially helps to identify corner cases of the algorithm and/or weak spots of the system; hence called adversarial benchmarking.

The applications can be selected from commonly used benchmarks such as DeathStarBench*. The objective is to investigate on the dependencies between services and how different sequences of incoming request patterns can affect each service as well as the whole system.

* https://github.com/delimitrou/DeathStarBench/blob/master/hotelReservation/README.md

End-to-End Scheduling in Large-Scale Deterministic Networks

Providing Quality of Service (QoS) to emerging time-sensitive applications such as factory automation, telesurgery, and VR/AR applications is a challenging task [1]. Time Sensitive Networks (TSN) [2] and Deterministic Networks [3] were developed for such applications to guarantee ultra low latency, bounded latency and jitter, and zero congestion loss. The objective of this work is to develop a methodology to guarantee bounded End-to-End (E2E) latency and jitter in large-scale networks.

C++, Expeience with OMNET++, KNowledge of TSN.

Tow ards TSN and 5GS Integration: Implementation of TSN AF

Time-Sensitive Networking (TSN)is a set of standards[1]developedby IEEE 802.1 Task Groupto enableEthernet networks to giveQuality of Service (QoS)guarantees for time-sensitiveor mission-critical traffic and applications.VariousTSN standards provide differing QoSguaranteesand require different functions to be implemented in hardware. As devices frommultiplevendorsneedtooffermutuallycompatiblefunctions,profilessuchas IEEE60802forIndustrialAutomation[2]arebeingdefined.These profilesfocusona commonset of functions and configurations in order to decreasethe complexity which possible variations in standards might create.

REST API, Knowledge and Experience with 5G systems, Undesrstanding of TSN.

Mobility Management for Computation-Intensive Tasks in Cellular Networks with SD-RAN

In the previous generations of cellular networks, both data plane and control plane operations were conducted jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and their adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane operations became possible in 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is shifted to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the cellular network because it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving this way network performance along multiple dimensions. Depending on the current spread of users (UEs) across BSs, and their channel conditions for which UEs periodically update their serving BSs, and BSs forward that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. Consequently, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. This comes into play even more with 6G networks in which in-network computing is envisioned to be integral part. Namely, users will be sending computationally-intensive tasks to edge clouds (through their BSs) and would be waiting some results as a response. However, as it will take some time until these tasks are run on the cloud, the user might be changing the serving BS. As a result, handover will have to be managed. However, while the task is being uploaded, performing handovers would not be good as then the task would need to be sent to another edge cloud. Consequently, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user while uploading the task and while downloading results.

In this thesis the goal would be to increase the overall network utility by deciding which tasks to serve (each task has its own utility), given the limited network resources in terms of the upload bandwidth, download bandwidth, storage in edge clouds, and finite computational capacity. Users besides sending tasks and receiving results are assumed to run other applications, with given service requirements. The student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other task would be to conductt realistic simulations and showing the advantages the developed algorithms offer against benchmarks.

Good knowledge of Python and interest to learn about mobility management in 5G

Enhanced Mobility Management in 5G Networks with SD-RAN

In pre-5G networks, both the data plane and control plane operations were performed jointly in Radio Access Networks (RANs). With the emergence of Software Defined Networks (SDNs), and its adaptation in RANs, known as SD-RAN, for the first time the separation of control from data plane became possible 5G RAN, as a paradigm shift on how the assignment of network resources is handled in particular, and how cellular networks operate in general. The control is transferred to centralized units, which are known as SD-RAN controllers. This brings considerable benefits into the mobile network since it detaches the monolithic RAN control and enables co-operation among different RAN components, i.e., Base Stations (BSs), improving the network performance along several dimensions. To that end, depending on the current spread of the users (UEs) across BSs, and their channel conditions for which the UEs periodically update their serving BSs, and BSs send that information to the SD-RAN controller, the latter can reallocate resources to BSs accordingly. BSs then perform the resource allocation across their corresponding UEs. As a consequence, exploiting the wide network knowledge leads to an overall improved performance as it allows for optimal allocation decisions.

This increased level of flexibility, which arises from having a broader view of the network, can be exploited in improving the mobility management in cellular networks. In the previous generations of cellular networks, each BS has its own set of frequencies at which it could transmit. Given that each user would receive service by only one BS, depending on the channel conditions the users would have with the serving BS and the number of users within the same sell, the user would decide on whether she would need a handover or it would be better to remain within the same serving area (i.e., receiving service from the same BS) . Currently, conditional handovers are being the most serious candidate for 5G. However, every handover involves a considerable cost, due to the preparations that need to be performed to hand a user over from one BS to another one. These will unavoidably lead to reductions in data rates and network resources for other users. On the other hand, having a centralized knowledge of all the network (which the SD-RAN controller has), to avoid frequent handovers, the controller has an extra degree of freedom by increasing the number of frequency blocks that can be assigned to a user experiencing bad channel conditions. This of course depends on the topology of the users in that moment.

In this thesis, the focus will be on jointly deciding on the resource allocation policy for each user across the entire area of the controller and when to perform the handover in order to optimize different performance aspects (e.g., provide proportional fairness). To that end, the student will formulate optimization problems and solve them either analytically or using an optimization solver, like Gurobi, CVX, etc. The other part would be conducting realistic simulations and showing the advantages the developed algorithms offer against state of the art.

Network Intrusion Detection using pre-trained tabular representation models

Network Intrusion Detection (NID) is a common topic in cybersecurity. However, it is not trivial to find a solution when facing the complicated network environment nowadays. Often a complex system is needed to process enormous volume of data stored in databases. This thesis proposes to use Deep Learning models to tackle the NID problem in a pre-train/fine-tune manner. As the new paradigm of transfer learning, the process of pre-training follows by fine-tuning has achieved huge success in many areas such as vision and NLP. We aim to study whether those trending models still perform well on large-scale structured data such as network security logs. It is plausible to leverage the strong learning ability of DL models to learn table representations and separate anomaly from benign records based on the learned information.

  • Machine learning knowdlege
  • Programming skills (Python, GIT)
  • Computer networking knowledge

Automated Generation of Adversarial Inputs for Data Center Networks

Today's Data Center (DC) networks are facing increasing demands and a plethora of requirements. Factors for this are the rise of Cloud Computing, Virtualization and emerging high data rate applications such as distributed Machine Learning frameworks. Many proposal for network designs and routing algorithms covering different operational goals and requirements have been proposed. This variety makes it hard for operators to choose the ``right'' solution. Recently, some works proposed that automatically generate adversarial input to networks or networking algorithms [1,2] to identify weak spots in order to get a better view of their performance and help operators' decision making. However, they focus on specific scenarios. The goal of this thesis is to develop or extend such mechanisms so that they can be applied a wider range of scenarios than previously. The thesis builds upon an existing flow-level simulator in C++ and initial algorithms that generate adversarial inputs for networking problems. [1] S. Lettner and A. Blenk, “Adversarial Network Algorithm Benchmarking,” in Proceedings of the 15th International Conference on emerging Networking EXperiments and Technologies, Orlando FL USA, Dec. 2019, pp. 31–33, doi: 10.1145/3360468.3366779. [2] J. Zerwas et al., “NetBOA: Self-Driving Network Benchmarking,” in Proceedings of the 2019 Workshop on Network Meets AI & ML  - NetAI’19, Beijing, China, 2019, pp. 8–14, doi: 10.1145/3341216.3342207.

- Profound knowledge in C++

Towards Log Data-driven Fault Analysis in a Heterogeneous Content Provider Network

Bayerischer Rundfunk (BR) operates a network to deliver content via television, radio and the internet to its users. This requires a highly heterogenous network. The network monitoring solution for the BR-network collects log data from involved devices and stores it in a central database. Currently, human operators make network management decisions based on a manual review of this log data. This especially includes root cause identification in case of network failures. Such a human-centric process can be tedious and does not scale well with increasing network complexity. In this thesis, the student should perform a thourough analysis of the described data and evaluate the potential for automated processing. Goal is to provide a data-driven approach that significantly supports human operators with identifying root causes in case of network failures.

Reliability Analysis of ONOS Releases based onCode Metrics and SRGM

Software Defined Networking (SDN) separates the control and data planes.Control plane can be considered as the brain of the network and it is responsible for configuring flows, finding paths and managing all the network functionalities like firewall,  load balancing,  etc.  For this reason,  the SDN controller became complex.  Furthermore, it is a large software platform, which have many contributors  with  different  experience  level.   As  a  result  the  code  contains  many undetected and unresolved bugs.  If one of these bugs is activated in the operational state, it may cause performance degradation or even collapse of the whole system.

SDN serves to broad range of applications with different requirements.  Some of the application areas like autonomous driving requires high reliability and performance degradation may cause undesired results.  Software Reliability Growth Models (SRGM) are statistical frameworks that are based on historical bug reports  for  reliability  analysis  and  widely  used  to  estimate  the  reliability  of  a software.  Open network operating system (ONOS) is an open source project and it became one of the most popular SDN platforms.  Its historical bug reports are open in their JIRA issue tracker.  Currently ONOS has 23 releases, its first ten  versions  are  investigated  with  different  SRGM  models  [1]  and  found  that different SRGMs fit to the bug detection of different versions of ONOS.

Source code metrics refer to quantitative characteristics of the code.  Those metrics  can  describe  the  size  of  the  code  (lines  of  code),  complexity  of  code (McCabe’s complexity), etc.  They have been used to predicting the number of bugs, identifying possible potential location of bug, etc.

The goal of this work is to analyse the reliability of different ONOS releases. For that purpose, an understanding of the correlation between the structure of source code and the bug manifestation process is crucial to predict the future bug manifestation of the new releases.  First, a state of the art research on the SRGM will  be  done  to  understand  the  software  reliability  and  SRGMs.   Afterwards the  student  should  implement  different  SRGMs  to  fit  the  error  manifestation of  every  release  and  compare  the  results  with  mentioned  research  [1].   Then, different  code  metrics  will  be  obtained  from  each  ONOS  release.   Then,  the correlation between SRGM and code metrics will be revealed.  At last reliability of the release will be analyzed with the best fitting SRGM. The result of this work will be to propose a reliability metric combining SRGM and code metrics that improves the software reliability prediction.

P. Vizarreta, K. Trivedi, B. Helvik, P. Heegaard, W. Kellerer, and C. Mas Machuca, An empirical study of software reliability in SDN controllers,  13th International  Conference  on  Network  and  Service  Management  (CNSM), 2017.

Reinforcement Learning for joint/dynamic user and slice scheduling in RAN towards 5G

In the Radio Access Network (RAN), the MAC scheduler is largely inherited across generations in the past, to fit to new networking goals and service requirements. The rapid deployment of new 5G technologies will make upgrading of current ones extremely complicated and difficult to improve and maintain. Therefore, finding new solutions for efficient Radio Resource Scheduling (RRS) is necessary to meet the new KPI targets. 5G networks and beyond use the concept of network slicing by forging virtual instances (slices) of its physical infrastructure. A heterogeneous network requires a more optimized and dynamic RRS approach. In view of the development of SD-RAN controllers and artificial intelligence, new promising tools such as reinforcement learning can be proven useful for such a problem.

In this thesis, a data-driven MAC slice scheduler will be implemented, that maximizes user utility, while learning the optimal slice partitioning ratio. A deep reinforcement learning technique will be used to evaluate the radio resource scheduling and slicing in RAN. The results will be compared with traditional schedulers from the state-of-the-art.

vnf2tx: Automating VNF platform operation with Reinforcement Learning

Hierarchical sdn control for multi-domain tsn industrial networks.

In this thesis student will focus on designing and implementing a hierarchical SDN solution for industrial multi-domain TSN network.

[email protected]

Deliberate Load-Imbalancing in Data Center Networks

Recently, a scalable load balancing algorithm in the dataplane has been proposed that leverages P4 to estimate the utilization in the network and assign flows to the least utilized path. This approach can be interpreted as a form of Graham's List algorithm.

In this thesis, the student is tasked to investigate how a different online scheduling algorithm called IMBAL performs compared to HULA. A prototype of IMBAL should be implemented in NS3. The tasks of this thesis are:

  • Literature research and overview to online scheduling and traffic engineering in data center networks.
  • Design how IMBAL can be implemented in NS3.
  • Implementation of IMBAL in NS3.
  • Evaluation of the implementation in NS3 with production traffic traces and comparison to HULA (a HULA implementation is provided from the chair and its implementation not part of this thesis).

5G-RAN control plane modeling and Core network evaluation

Next generation mobile networks are envisioned to cope with heterogeneous applications with diverse requirements. To this end, 5G is paving the way towards more scalable and higher performing deployments. This leads to a revised architecture, where the majority of the functionalities are implemented as network functions, which could be scaled up/down depending on the application requirements. 

3GPP has already released the 5G architecture overview, however there exists no actual open source deployment of RAN functionalities. This will be crucial towards the evaluation of the Core network both in terms of scalability and performance. In this thesis, the student shall understand the 5G standardization, especially the control plane communication between the RAN and 5G Core. Further, an initial RAN function compatible with the 5G standards shall be implemented and evaluation of control plane performance will be carried out. 

  • Strong knowledge on programming languages Python, C++ or Java.
  • Knowledge about mobile networking is necessary.
  • Knowlegde about 4G/5G architecture is a plus.

Interdisciplinary Projects

Joint radio and computing resource allocation using artificial intelligence algorithms.

Mobile Edge Computing (MEC) enabled 6G network support low latency applications running in energy-constrained and computational limited devices, especially IoT devices. Using the task offloading concept, the devices offload the incoming tasks fully or partially to MEC depending on the device and network side's communication and computation resource availability.

The 6G networks are oriented towards the Digital Twins (DT); therefore, the resource allocation and offloading decisions are enhanced with the context-awareness of the devices, environment, and network. The device context awareness consists of battery state, power consumption, CPU load, and traffic type. Further, the environmental context-awareness includes the position of the network components, the mobility patterns, and the quality of the wireless channel and the availability of the network resources.

In this project, the student will focus on developing and testing an artificial intelligence algorithm for joint allocating of computing and radio resources in a predictive manner, focusing on decreasing individual devices' energy consumption and reducing processing latency.

  • Work with a 6G radio access network simulator, to generate the database for the scenario with devices having high energy efficiency and low task processing latency requirements.
  • Develop a reinforcement learning algorithm for joint allocation of radio and computing resource allocation.
  • Comparing the developed model with the state-of-the-art approaches.
  • Test and documentation.
  • Good knowledge of Python programming.
  • Good knowledge of deep learning/reinforcement learning.

Research Internships (Forschungspraxis)

Temporal graph learning for ip-level ntma.

Analyzing traffic in today's communication networks becomes more and more complex due to the increasing heterogeneity of networked devices and general rising traffic volumes.  In this context, data-driven methods can facilitate a deep understanding of the inherent dynamics needed to operate such networks efficiently. Because network-related data is often naturally represented in graph form, this Internship specifically seeks to evaluate how methods from the Pytorch library for temporal graph learning, "PyTorch Geometric Temporal," can be applied to IP-to-IP level data.  

Goal is to among others to predict:

  • IP-node activity over time 
  • IP-to-IP level communications (e.g. number of packets) over time
  • Set up a working ML pipeline.
  • Fine-tune models / try different models.
  • Identify promising directions and limitations
  • Conclude what needs to be done/tried in the future.
  • knowledge in python 
  • basic knowledge in ML
  • basic knowledge about  IP networks 

Design and Evaluation of Detection Methods for an Experimental Molecular Communication Platform

In this internship, the student will work with experimental data from an MC testbed to implement, evaluate, and improve detection algorithms. The considered algorithms range from simple to complex, including symbol-by-symbol detection, sequence detection, matched filters, etc. The goal is to identify the strengths and weaknesses of various algorithms with respect to the characteristics of the MC signal at the receiver.

Topology Upgrade for Optimal and Reliable Multi-Period Network Planning

Optical networks are crucial for digital communications, handling massive data transport over long distances with wavelength division multiplexing (WDM) in the C-band. However, growing traffic demands may surpass conventional WDM capacities, prompting the exploration of ultra-wideband (UWB) and spatial division multiplexing (SDM) solutions. SDM increases throughput by utilizing different spatial domains, while UWB increases the available spectrum by taking advantage of transmission over multiple bands. Despite hesitancy due to cost, network operators recognize the need for optimal topology upgrades to meet evolving traffic demands, especially when reliability is taken into account. On top of the SDM and UWB upgrades on the existing topology, this also includes installing new links that do not exist in the original topology.

In this thesis, the goal is to optimally add links to existing core network topologies using the aforementioned schemes (SDM and UWB), according to increasing traffic demands, towards minimum cost, and considering reliability constraints, such as dedicated 1+1 protection for the demands.

  • Basic knowledge of optical networks and network reliability.
  • Experience in Python.
  • Experience with formulating and solving Integer Linear Programming (ILP) problems.

[email protected]

Implementation of a Medical Communication Library in C++

Implementation of a Medical Communication Library in C++ to improve the performance.

Improving the Medical Communication Protocol for the Room Sensitive Measurement of Vital Parameters

In this FP, our existing communication protocol in the medical context is extended.

Detailed Requirement Analysis for the Reliability and Availability of Medical Network Communication

6G soll als neuer und zukünftiger Mobilfunkstandard den Menschen in den Fokus rücken. Neben sehr geringen Latenzen und extrem großen Datenübertragungsraten wird das Netzwerk zuverlässiger, sicherer und dynamischer. Diese Eigenschaften sind besonders in der Medizin und der Medizingerätetechnik gefragt, um intelligente Datenübertragung zwischen Geräten und Menschen zu ermöglichen. Im Rahmen des Verbundprojektes „6G-life“ sollen zwei medizinische Demonstratoren entwickelt werden, die diese Netzwerkeigenschaften untersuchen. Ein Demonstrator ist ein robotisches Telediagnostiksystem zur Remote Untersuchung von Patienten. Ein zweiter Demonstrator beschäftigt sich mit der raumadaptiven Erfassung von Vitalparametern.

Ziel der Forschungspraxis ist die Ermittlung von medizintechnischen Anforderungen an die Netzwerkkommunikation hinsichtlich der Ausfallsicherheit. Dies beinhaltet eine Recherche gängiger Normen und Richtlinien, die bei der medizinischen Datenübertragung berücksichtigt werden müssen, sowie Maßnahmen, die zur Sicherstellung zuverlässiger Kommunikation getroffen werden können. Darüber hinaus sind Interviews mit Medizinern wünschenswert, um die Nutzerseite zu berücksichtigen.

Im Rahmen der Arbeit sollen folgende Punkte behandelt werden:

  • Recherche zu gängigen Richtlinien und Mechanismen, die in der medizintechnischen Netzwerkkommunikation zur Ausfallsicherheit eingesetzt werden.
  • Interviews mit Klinikpersonal
  • Evtl. Messung mit den vorhandenen Testbeds

Diese FP wird in Kooperation mit unseren Partnern der MITI Gruppe am Krankenhaus "Rechts der Isar" durchgeführt.

  • Interesse an Medizintechnik
  • Deutsch (zwingend erforderlich zwecks der Interviews)
  • Grundlegende Kenntnisse über Netzwerkkonzepte

Evaluation of Time Synchronization in NR UE-UE Interference Scenarios

This research internship aims to assess the impact of time synchronization discrepancies between base stations located in different cells. When time offsets occur, transmissions from one cell may reach user equipment (UEs) in neighboring cells at unintended times, resulting in interference and potential performance degradation.

This research internship will set up a MATLAB simulation to evaluate this scenario.

  • Understanding of 5G systems.
  • Design of Experiments.
  • Experience with MATLAB.

    However, the serverless paradigm also comes with its challenges. First, a systematic methodology is needed to assess the performance of heterogeneous open-source serverless solutions. To our knowledge, existing surveys need a thorough comparison between these frameworks. Second, there are inherent challenges associated with the serverless architecture, specifically due to its short-lived and stateless nature.

Adapting reinforcement learning to the characteristics of quantum key distribution networks

The research internship aims to implement a reinforcement learning (RL) algorithm using Python to optimize routing agents in QKD networks. The literature showed different proof of concepts from other applications, and the research internship's objective is to adapt the best-suited one to the characteristics of QKD. 

- Background in AI/ML

- Experienced in Python

- Experienced in Statistics

Mario Wenning

[email protected]

In this work, we aim to improve network availability based on the mincutsets. 

Communication Network Reliability course, Python, and Integer Linear Programming will be useful.

Investigating SDR-Based OpenRAN with LiFi Technology

This internship offers a comprehensive exploration of cutting-edge telecommunications technologies, focusing on the integration of Software-Defined Radios (SDRs) with Light Fidelity (LiFi) technology within the OpenRAN architecture.

MPTCP Flexbed: A Comprehensive Framework for Evaluating MPTCP Schedulers in Heterogeneous Network Environments

  • Review of related literature on multipath protocols
  • MPTCP+LiFi enabled hardware setup 
  • Evaluate and Compare different schedulers on linux testbed

If you are interested in this work, please send an email with a short introduction of yourself along with your CV and grade transcript.

Evaluation of Time Synchronization in NR BS-BS Interference Scenarios

The research will utilize the 5G-NR functions available in Matlab for a two-base station scenario, each having multiple UEs connected in both cells. The throughput and block error rate of a UE at the edge of the cell will be evaluated for multiple simulations for different values of delayed transmission in the interfering base station. The study will also incorporate the other BS parameters, such as BS transmit power and the distance between the two BSs, and analyze their influence on the results obtained.

Evaluating a Reliability Block Diagram (RBD)

A reliability block diagram is a tool used to measure the availability of a system (a network, in our case). However, the existing tools as software packages do not work with bidirectional links. 

This work aims to build a tool that can evaluate the availability of a network based on the RBD.

Python and data structures, Kommunikationsnetze or Communication Network Reliability course would be useful. 

Sovereignty of an optical switch

An optical switch has multiple subcomponents. Usually, a switch manufacturer purchases raw materials from different subcomponent manufacturers.  When a network operator purchases switches from different switch manufacturers, there is a possibility that switches from different manufacturers share a common subcomponent. This becomes a vulnerable single point of failure. For example, in the case of laptops, an HP laptop and a Dell laptop can have the same AMD processor.

Our work is related to the trustworthiness of the subcomponent manufacturers. The goal is to evaluate:

a) The trustworthiness of a switch based on the subcomponent manufacturers

b) Provide guidelines to network operators to choose the most sovereign set of switches possible to avoid a single point of failure.

Implementation of a Medical Communication Protocol

The next generation of communication networks, namely 6G, will enable a huge variety of medical applications. In the current phase, our research focuses on optimizing the interaction between network and medical application developing. For this, we joined forces with the Minimally Invasive Interdisciplinary Therapeutical Intervention (MITI) group , sitting at the hospital "Rechts der Isar".

This research internship focuses on one certain use case, the mobile patient monitoring of patiens in the operation room. In particular, the vital parameters of the patient are continously measured and sent to a server. The task of the research internship is to develop and implement the communication protocol between the sensors and the processing server. Hereby, a basic implementation is already given. However, key components are still missing, which should be implemented and evaluated within the scope of this research internship.

Please note, that the real setup is located at MITI. You may have to work there.

  • Knowledge about Python and Linux
  • Basic communication (protocol) principles

A Study on Learning-Based Horizontal Autoscaling on Kubernetes

 The rapid growth of edge computing has introduced new challenges in managing and scaling workloads in distributed environments to maintain stable service performance while saving resources. To address this, this research internship aims to explore the feasibility and implications of extending the AWARE framework (Qiu et al., 2023) [1], which has been developed by as an automated workload autoscaling solution for production cloud systems, to edge environments. 

 AWARE utilizes tools such as reinforcement learning, meta-learning, and bootstrapping when scaling out workloads in the horizontal dimension by increasing the number of deployment instances and scaling up in the vertical dimension by increasing the allocated resources of a deployment instance. We will employ edge environment infrastructures with limited resources that run a lightweight distribution of the Kubernetes (K8s) container orchestration tool, and the goal is to gain insights into the performance, adaptability, and limitations of this approach.

Development and Evaluation of an Intelligent Wireless Resource Management for 5G/6G Downlink Channel

In this work, we will evaluate several additional techniques in 5G/6G toward reliability enhancements focusing on the Radio Access Network (RAN). The student is expected to first understand and evaluate the concept via simulations over MATLAB. Then, the techniques will be implemented in OpenAirInterface (OAI) [1] platform and we will evaluate the enhancements over our practical 5G testbed setup.

The initial setup will include a mobile robot, 5G Stand-alone communication, and a multi-access edge computing (MEC) system running a machine learning algorithm.

The expected outcome is to have improvements to the RAN of OAI including but not limited to wireless channel estimation and equalization, downlink reliability. More details will be provided after the first meeting.

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet, “OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, 2014.

- Good C/C++ experience

- Good Matlab knowledge

 - Medium knowledge on OFDM and Wireless Channel Estimation

- Good Python knowledge is a plus

- Machine Learning understanding is a plus

[email protected]

ILP-based network planning for the future railway communications

This work focuses on the exploration of networks enabling train control and on-board data communications under mobility scenarios. Today, low bandwidth networks such as GSM, providing less than 200 Kbps are being used to transmit train control information. Moreover, despite trains may use multiple on-board technologies to provide users with an internet connection (e.g., repeaters, access points), they fail in their attempt as these connections are characterized by having low throughput (less than 2 Mbps) and frequent service interruptions. This work aims at the development of a network planning solution enabling future applications in train mobility scenarios such as: Automatic Train Operation (ATO) [1,2], leveraging cloud technologies and meeting bandwidth requirements of data-hungry end-users' applications. Here, special attention will be given to the migration of communications services triggered by trains mobility patterns. It is expected of the student to find solutions to the following questions:

When to trigger service migrations?

Where to migrate services? (i.e., to which data center)

How to handle this process? (So that the user does not perceive any interruption)

Trains mobility patterns

Service requirements in terms of bandwidth and delay

Network topology

Data center locations

  The results from this work can be useful to get an insight on requirements for Smart Transportation Systems, that may in turn be useful for cementing the basis of other scenarios such as: Autonomous Driving and Tele-Operated Driving.

 [1] Digitale Schiene Deutschland. Last visit on 13.12.2021 https://digitale-schiene-deutschland.de/FRMCS-5G-Datenkommunikation [2] 5G-Rail FRMCS. Last visit on 13.12.2021 https://5grail.eu/frmcs/

Basic knowledge in:

Integer Linear Programming (ILP), heuristics or Machine Learning (ML).

Machine-learning-based network planning for the future railway communications

Evaluation of traffic model impact on a context-aware power consumption model of user equipment.

Energy efficiency is one of the key performance requirements in the 5G network to ensure user experience. A portion of devices, especially the Industrial Internet of Things (IIoT), run on limited energy, supported by the batteries not placed over the lifetime.

Therefore, the estimation of the power consumption and battery lifetime has recently received increased attention. Multiple context parameters, such as mobility and traffic arrivals, impact the device's power consumption.

In this thesis, the student shall focus on analysing the impact of different traffic models on the power consumption of user equipment. Different source and aggregated traffic models will be implemented depending on the number of devices n the scenario. The implemented traffic models will be evaluated based on a context-aware power consumption model for the user equipment.

  • Knowledge mobile networks.

Cost evaluation of a dynamic functional split

Increased interference is one of the main drawbacks of cell densification, which is an important strategy for 5G networks to achieve higher data rates. Function centralization has been proposed as a strategy to counter this problem, by letting the physical or scheduling functions coordinate among one another. Nevertheless, the capacity of the fronthaul network limits the feasibility of this strategy, as the throughput required to connect low level functions is very high. Fortunately, since not every function benefits in the same way from centralization, a more flexible approach can be used. Instead of centralizing all functions, only those providing the highest amount of interference mitigation can be centralized. In addition, the centralization level, or functional split, can be change during runtime according to the instantaneous network conditions. Nonetheless, it is not fully know how costly it is to deploy and operate a network implementing a dynamic functional split.

In this internship, the cost of a radio access network implementing a dynamic functional split will be evaluated. A simulator already developed at LKN will be used and extended to produce network configurations adapted to the instantaneous user position and activity. Then, off-the-shelf cost models will be improved and used to estimate the deployment and operating cost of the network under multiple scenarios. Furthermore, the conditions on which a dynamic functional split is profitable will be investigated. Improvements on the functional-split selection algorithm will be proposed, such that the operator benefits from enhanced performance without operating at exceedingly costly states. Finally, a model that takes into account the cost of finding and implementing a new functional split will be employed and its results compared to the previous results.

Jitter Analysis and Comparison of Jitter Algorithms

In electronics and telecommunication, jitter is a significant and an undesired factor. The effect of jitter on the signal depends on the nature of the jitter. It is important to sample jitter and noise sources when the clock frequency is especially prone to jitter or when one is debugging failure sources in the transmission of high speed serial signals. Managing jitter is of utmost importance and the methods of jitter decomposition have changed comparably over the past years.

In a system, jitter has many contributions and it is not an easy job to identify the contributors. It is difficult to get Random Jitter on a spectrogram. The waveforms are initially constant, but the 1/f noise and flicker noise cause a lot of disturbance when it comes to output measurement at particular frequencies in a system. 

The task is to understand the difference between the jitter calculations based on a step response estimation and the dual dirac model by comparing the jitter algorithms between the R&S oscilloscope and other competition oscilloscopes. Also to understand how well the jitter decomposition and identification is there.

The tasks in detail are as follows.

Setup a waveform simulation environment and extend to elaborate test cases

Run the generated waveforms through the algorithms

Analyze and compare the results:

Frequency domain

Statistically (histogram, etc)

Time domain

Consistency of the results

Evaluate the estimation of the BER (bit error rate)

Identify the limitations of the dual-dirac model

Compare dual-dirac model results with a calculation based on the step response estimation

Generate new waveforms based on the analysis

Summarize findings

Probabilistic Traffic Classification

The goal of this thesis is the classification of packet-level traces using Markov- and Hidden Markov Model. The scenario is open-world: Traffic of specific web applications should be distinguished from all possible web-pages (background traffic). In addition, several pages should be differentiated. Examples include: Google Maps, Youtube, Google Search, Facebook, Google Drive, Instagram, Amazon Store, Amazon Prime Video, etc.

Internships

Praktikantin planung, steuerungstechnik und produktionsnahe it, data analysis and prediction of optical network performance on open source data.

The Internship aims to analyze Open Source Optical Network Data for performance prediction of Optical Networks and develop data-driven methods for quality of transmission estimation.

[email protected]

Probability parameters of 5G RANs featuring dynamic functional split

The architecture of 5G radio access networks features the division of the base station (gNodeB) into a centralized unit (CU) and a distributed unit (DU). This division enables cost reduction and better user experience via enhanced interference mitigation. Recent research proposes the posibility to modify this functional split dynamically, that is, to lively change the functions that run on the CU and DU. This has interesting implications at the network operation.

In this topic, the student will employ a dedicated simulator developed by LKN to characterize the duration and transition rates of each functional split under multiple variables: population density, mitigation capabilities, mobility, etc. This characterization may be used then on traffic models to predict the network behavior.

MATLAB, some experience with mobile networks and simulators

Student Assistant Jobs

Working student for implementing and maintaining a 5g roaming testbed.

5G is the newest generation of mobile networks allowing for higher data-rates, lower latency and many new features like network slicing. Its central element is the 5G Core, which is a network of specialised Network Functions (NFs). Roaming allows subscribers to connect to the internet via other network operator’s networks if they have a roaming agreement. We are looking for a student to help implement and maintain a 5G Roaming testbed. At first, that is planned as an open source testbed leveraging Open5GS. Later, the plan is to connect this open source testbed to the LKN campus network.

This working student position may run parallel to Master Theses with more focused implementation and evaluation works. The working student is welcome to follow up on this work with his/ her own research internship or Master’s thesis.

The primary objective of this work is to help implement and maintain a 5G Roaming testbed. This testbed shall then be used for investigation of security mechansims and performance measurements. Those are not the main job of the student, but the student is supposed to help.

1. Work into 5G Roaming

2. Implement missing Roaming functionalities into Open5GS

3. Maintain Roaming Testbed

4. Connect open source 5G Roaming testbed with Campus Network (once possible)

5. Aid in security investigations

6. Aid in performance measurements

7. Potentially add other NFs later

• Motivation and team spirit

    – interest and motivation to learn the system are sufficient

• Interest in security

Working Student for the Medical Testbed

Most important:

  • Motivation and willingness to learn unknown things.

Of advantage:

  • C/C++ and knowledge about how other programming languages work (Python, etc.)
  • Knowledge about communication networks (exspecially the RAN), 5G concepts, the P4 language, SDN, Linux.

Working Student for Analysis, Modeling and Simulation of Communication Networks SS2023

The main responsibilities of a working student include assistance to tutors in the correction of the programming assignments, as well as answering the questions in Moodle.  Working time is 6-7 hours per week in the period from May to July.

Working Student for Testbed on 5G/6G RAN

The results expected from this work are the enhancement of the 5G/6G tested setup with additional features on the Radio Access Network (RAN) and Core Network (CN). The work is focused on the OpenAirInterface (OAI) [1] platform, which forms the basis of the testbed setup. The expected outcome is to have improvements in wireless resource scheduling, focused on the uplink (UL), power management, and core network function management. 

[1] N.Nikaein, M.K. Marina, S. Manickam, A.Dawson, R. Knopp and C.Bonnet, “OpenAirInterface: A flexible platform for 5G research,” ACM SIGCOMM Computer Communication Review, vol. 44, no. 5, 2014.

  • Good C/C++ experience
  • Good Python knowledge
  • RAN and CN architecture understanding is a plus

[email protected][email protected]

Working Student for Network Delay Measurements

Communication Networks must fulfill a strict set of requirements in the Industrial Area. The Networks must fulfill strict latency and bandwidth requirements to allow trouble-free operation. Typically, the industry relies on purpose build solutions that can satisfy the requirements.

Recently, the industry is moving towards using Ethernet-based Networks for their use case. This enables us to use common of the shelf hardware to communicate within the network. However, this hardware still will execute industrial applications and therefore has the same strict requirements as the network. In this project, we consider Linux-based hosts that run the industrial applications. We consider different networking hardware and configurations of the system to see how it affects performance. The goal is to investigate the overhead of the host. 

Your tasks within the project are :

  • Measure the Host Latency with different NICs
  • Measure the Host Latency with different Hardware Offloads
  • Tune, configure, and measure the Linux Scheduler to improve performance

You will gain:

  • Experience with Networking Hardware
  • Experience with Hardware Measurements 
  • Experience with Test Automation

Please send a short intro of yourself with your CV and transcript of records to us. We are looking forward to meeting you.

  • Familiarity with Linux Console
  • C (not required, but a plus)

[email protected]

Solving the manufacturer assignment problem to maximise availability of a network using linear programming

Availability is the probability that a device performs its required function at a particular instant of time.

In most networks, the components are brought from different manufacturers. They have different availabilities. Network operators prefer having reliable components handling more traffic. This ensures the robustness of the network. So, assigning appropriate manufacturers to the components in the topology guaranteeing  a) maximum availability, and  b) load balancing on the nodes is essential.

For a fixed topology and known traffic, how can the components be assigned to manufacturers to maximise availability and balance load on nodes?

  • Communication Network Reliability course/ Optical Networks course at LKN
  • Knowledge of Linear Programming and/or nonlinear programming

Demo implementation: Multi-domain redundant network routing

Software-Defined Networking (SDN) is a network paradigm where control and data planes are decoupled. The control plane consists on a controller, which manages network functionality and can be deployed in one or multiple servers. The data plane consists on forwarding entities which are instructed by the controller on how to forward traffic.

A network can be divided in multiple domains in order to ease its management or limit ownership. In multi-domain SDN, each domain has a controller which is responsible for the management. Controllers in different domains cooperate which each other aiming at providing multi-domain end-to-end connectivity.

In this work, the student will receive an abstract topology representing the multi-domain network. This information has to be used to build a virtual network, that can be used in the testing of different algorithms. The implementation should include a GUI, in order to visualize the topology and interact with the different elements in the network.

  • Object-Oriented Programming
  • Web programming (GUI)

End-to-End Delay Measurements of Linux End Hosts

As preliminary results show, Linux TCP/IP Networking Stack introduces a high networking delay. The topic of this work is to perform an empirical study on the Linux socket-based transmission approach and implement a delay measurement workflow based on existing foundations and repositories.

[1] Where has my time gone?

Basic knowledge of 

  • Networking and Linux

Implementation of a Techno-Economic tool for VLC

Future IoT will need wireless links with high data rates, low latency and reliable connectivity despite the limited radio spectrum. Connected lighting is an interesting infrastructure for IoT services because it enables visible light communication (VLC), i.e. a wireless communication using unlicensed light spectrum. This work will aim at developing a tool to perform an economic evaluation of the proposed solution in the particular case of a smart office.

For that purpose, the following tasks will have to be performed:

  • Definition of a high-level framework specifying the different modules that will be implemented as well as the required inputs and the expected outputs of the tool.
  • Development of a cost evaluation Excel-VBA tool. This tool will allow to evaluate different variations of the selected case study and if possible, to compare different alternative models (e.g., dimensioning) or scenarios (e.g., building types).

- Excel and VBA

Implementation of Energy-Aware Algorithms for Service Function Chain Placement

Network Function Virtualization (NFV) is becoming a promissing technology in modern networks. A challenging problem is determining the placement of Virtual Network Functions (VNFs). In this work, we plan to implement existing algorithms for embedding VNFs chains in NFV-enabled networks. 

Experience in Python or Java, object oriented programming

[email protected]

External Thesis

Academia.edu no longer supports Internet Explorer.

To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to  upgrade your browser .

Enter the email address you signed up with and we'll email you a reset link.

  • We're Hiring!
  • Help Center

paper cover thumbnail

MASTER THESIS ADMINISTRATION OF REMOTE COMPUTER NETWORKS

Profile image of RAJESH KUMAR

Related Papers

Bruce Elenbogen

This paper discusses a non-traditional course in computer networking. The course is a laboratory course with substantial hands-on experiences, which can help to prepare students for jobs in industry as soon as they graduate from an undergraduate institution. This course is not meant to replace the traditional network course but to supplement it by teaching how computer networks work in practice and by exploring new topics such as internetworking, high speed networking, client/server computing and security.

networking master thesis

International Research Group - IJET JOURNAL

World Scientific

Jawwad Shamsi

Efficient and cost-effective measurement of network characteristics is pivotal for distributed systems deployed on the Internet. The network characteristics are utilized by Internet-based distributed systems to provide better service to the user and enhance performance for the application. This chapter provides a detailed analysis of existing techniques for the measurement of the four important network characteristics which include latency, bandwidth, path detection and loss rate. The chapter describes key concepts related to network measurements, including techniques for clock synchronization, strategies for time stamping of probes, methods for network analysis, difference between active and passive measurements and comparison of round trip vs. one way delay measurements. It elaborates the usefulness of different transport and network layer protocols (i.e. TCP, UDP and ICMP) for obtaining network measurements and continue this discussion to describe some important measurement tools such as Ping, Traceroue, Pathchar, Sting, Scriptroute, Spruce and Paris Traceroute. The chapter explains the effectiveness and limitations of these tools with respect to the measurement of network characteristics.

IOSR Journal of Computer Engineering

azmath mubeen

network administration

Mohd Nazri Ismail

International Journal IJRITCC

Citation/Export MLA Mr. M. B. Patil, Dr. R. S. Kamath, Dr. P. G. Naik, “Design and Development of Network Monitoring and Controlling Tool for Department of Computer Studies CSIBER”, March 15 Volume 3 Issue 3 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1237 - 1243, DOI: 10.17762/ijritcc2321-8169.150376 APA Mr. M. B. Patil, Dr. R. S. Kamath, Dr. P. G. Naik, March 15 Volume 3 Issue 3, “Design and Development of Network Monitoring and Controlling Tool for Department of Computer Studies CSIBER”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 1237 - 1243, DOI: 10.17762/ijritcc2321-8169.150376

Kanu Richmond

The need for good and reliable data transmission within computer network and internet forms the basis for management and control of bandwidth. Without bandwidth management, an application or user will not be able to control all available bandwidth and prevent other applications or users from using the networks. It will be impossible to differentiate between various network traffics, and it will also be difficult to control which user or application has priority on the network. Applications which require specific quantity and quality of service may not be predicted in terms of available bandwidth, thus making some applications run poorly due to improper bandwidth allocation. This work focus on the development of an application to combat the challenges facing easy flow of data transmission problems in network design as organization network evolves. PHP Script, Apache Server and MySQL are the development tools used. Keywordsbandwidth management, data transmission, computer networks, ap...

Aung Than Kyaw

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

RELATED PAPERS

Sujeeth Reddy

Sasikumar Punnekkat

IJSTE - International Journal of Science Technology & Engineering

IJSTE - International Journal of Science Technology and Engineering

prashanth b

IJIREM JOURNAL

Mohmmed Munna

BT Technology Journal

David Parish

Icact Transactions on the Advanced Communications Technology

ASHISH K U M A R JHA

Petros Zerfos

Zenodo (CERN European Organization for Nuclear Research)

anita antwiwaa

Bruce Hallberg

IJRASET Publication

Nwakeze Osita Miracle

NWAKEZE M I R A C L E OSITA , Nwakeze Miracle

International Astronomical Union Colloquium

Guido Russo

Iwan Adhicandra

International Journal of Computer Applications

Global Academic Digital Library (GADL) - Journal of Inventions in Computer Science & Communication Technology (JICSCT)

Transmission Control Protocol Performance Monitoring for Simulated Wired University Computer Network using OPNET

Ammar O . Hasan

Adam Kaliszan

Journal of Computer Sciences and Applications

Karima Velásquez , Eric Gamess

Ata Ul Munim Aseel Shaikh

Springer International Publishing eBooks

Cajetan Akujuobi

  •   We're Hiring!
  •   Help Center
  • Find new research papers in:
  • Health Sciences
  • Earth Sciences
  • Cognitive Science
  • Mathematics
  • Computer Science
  • Academia ©2024
  • Skip to content  (access key: 1)
  • Skip to Search  (access key: 2)

Institutes, schools, other departments, and programs create their own web content and menus.

To help you better navigate the site, see here where you are at the moment.

Master's Theses

Topics for master's thesis seminar and projects in network and security.

  • Comparison of Firewall Rulesets in OpnSense, OpenWRT, and RouterOS

The aim of this project is to take an exemplary firewall rule set defined for the OpnSense firewall (using FreeBSD PF as the basis) and duplicate as many details as possible in a current OpenWRT (using the Linux netfilter based fw4 system) and RouterOS (with Mikrotik RouterOS CLI translating to Linux iptables rules). Based on this example, the main differences should be documented as findings for advantages/disadvantages of the respective systems. The example rule set should include multiple (VLAN) interfaces, a mix of IPv4 and IPv6 hosts and rules, different layer 4 protocols, and some special cases like multicast packet handling. A complete example with these aspects will be made available as part of the task. It is possible to extend this project towards a Master's thesis by including additional aspects such as comparative performance analysis, integration with VPN tunnels and dynamic routing, software mitigations for security relevant bugs in the respective kernels and network stacks, etc.

Kontakt: Rene Mayrhofer Michael Roland Michael Sonntag

  • Ingest probable location data using a Large Language Model

In the CDL Digidow (digidow.eu) ecosystem, users have complete control over their Personal Identity Agent (PIA), which can perform tasks, such as unlocking doors based on data gathered from sensors in the surrounding environment. One aspect of securing this system is that the PIA should be aware of their user's current activities, so it can judge if the person in front of the door might actually be an impostor. Two potential digital sources of such information, to take into account are the user's email account and calendar. The goal of this project is live-scanning this data, extracting relevant information like booked trains, flights, hotels, or other appointments, and outputting any identified events to the PIA's location model. You should use techniques like prompt engineering and agent-based approaches (no training or long-running fine-tuning) with existing local LLMs. You should expect to write some regular code in a reasonable language of your choice to continuously ingest input and forward the LLMs outputs. Your solution should maintain a list of detected future events, in an agreed-upon format, which the LLM can update and the location model can consume.

Contact: Rene Mayrhofer Martin Schwaighofer

  • DEPS Project - Problem A

Problem description: Industrial-scale reverse engineering is a big problem, with estimated losses for the industry at 6,4 billion dollars in 2022 in Germany alone. A closer look at the problem shows that typically the main effort needed to steal the intellectual property of companies producing machines controlled by software, resides on replicating hardware, since software can often be copied verbatim with no reverse engineering effort required.

Approach: In DEPS we aim to change this status quo by means of a novel copy protection mechanism that “glues” a program P to a specific machine M. More concretely, we propose to subtly change P into a (reflective) program P ′ which will turn itself into P at run time, only if it is run in the target machine M. If P ′ is executed in a machine M′ other than M (even if M′ is a clone of M), it will then behave incorrectly, i.e., differently than P. Clearly, for this approach to work, the changes that P ′ needs to make to its code to become P at run time need to be well protected. This can be achieved by making these changes dependent on physically unclonable properties of the target machine M, via a physically unclonable function (PUF).

Task: We would like you to work with us in a proof of concept of this novel protection mechanism, developing a prototype application of the protection applied to an example program P that controls a critical functions of a track tamping machine produced by our company partner Plasser & Theurer. The task is to implement the described protection mechanisms using reflection (i.e., self-modifying code) and a provided PUF. We will provide you with a detailed high-level specification of the mechanism and support you to refine it to the required level of abstraction, i.e., to its prototype implementation.

Prerequisites: If you apply for this project, we expect you to have good programming and problem solving skills, preferably in C and C++.

Contacts at SCCH: Dr. Flavio Ferrarotti Univ.-Prof. Dr. Juliana Bowles Rene Mayrhofer (Organization issues)

DEPS Project - Problem B:

Problem description: In man-at-the-end (MATE) software attacks, attackers target assets embedded in software. By means of reverse engineering they try to steal confidential information, such as intellectual property in the form of algorithms. MATE attackers can mount sophisticated attacks, as they can tamper with software and data in their labs, where they have all kinds of software aids, such as debuggers, tracers, emulators, and customized operating systems; and hardware aids such as developer boards with (JTAG-based) hardware debuggers. Software protection techniques developed in our project DEPS transforms code to prevent situations where MATE attackers can steals the intellectual property of companies producing machines controlled by software. In the current industrial landscape, attackers concentrate their effort on replicating hardware, since the software components can usually be copied verbatim with no or very little reverse engineering effort required. Industrial-scale reverse engineering is a big problem, with estimated losses for the industry at 6,4 billion dollars in 2022 in Germany alone.

Task: We want to evaluate thoroughly the protection mechanism developed in DEPS by modelling the most relevant relations between:

  • (i) assets, 
  • (ii) the software those assets are embedded in, 
  • (iii) deployed protections, 
  • (iv) individual attack steps and tools and methods to perform attacks on those protections and on the assets,
  • (v) possible paths of attack that start from scratch and through which attackers can reach their ultimate reverse-engineering end goal, i.e., stealing the original asset.

For that, we propose to adapt and instantiate the meta-model for software protections and reverse engineering attacks proposed in  https://www.sciencedirect.com/science/article/abs/pii/S0164121218302838 , opens an external URL in a new window  with the specific DEPS protection approaches, protection goals and reverse engineering attacks applicable to our case studies, building a Knowledge Base to perform risk analysis.  

Prerequisites:  Solid knowledge of software security fundamentals. Knowledge of risk analysis techniques and/or reverse engineering techniques would be ideal.

  • Evaluating Attack Scenarios against Large Language Models

Abstract: Large Language Models (LLMs) like (Chat)GPT, LLaMA, Alpaca, etc. are currently being evaluated or already being put into use in many new scenarios, including decision-making processes. The aim of this thesis is to experiment with, evaluate, and potentially develop counter-measures to text-based attack scenarios for such LLMs. A starting point are the various (local or cloud hosted) chat based interfaces to interact with such models: by engineering text prompts to explicitly make models misbehave, that is, emit answers that seem counter to the intention of the respective scenario, the thesis should document a first starting set of attacking prompt types. Based on such attack prompts, the next question is how these prompts can be fed into LLM-using systems in specific scenarios, e.g. for filtering resumes of job applicants, preparing reviews of scholarly documents, or summarizing news sources. Potential approaches include hiding the attack prompts in various file formats such as HTML or PDF in a way that human reviewers will not notice the hidden prompts but LLMs acting on those files will receive them as input. Ideally, the thesis will end with a classification of attack prompt classes and injection methods for a starting set of LLM based services. Students interested in this topic should have a basic understanding of how machine learning in general and LLMs in particular as well as a strong interest in working around the usual constraints of a system to "think outside the box".

Contact: Rene Mayrhofer

  • Privacy-Preserving Biometric Matching via Secure Two-Party Computation

Abstract: Strong user authentication based on biometrics is gaining more and more importance. As a basis for further research in the domain of privacy-friendly usage of biometrics, the goal of this thesis project is to analyze the practical efficiency and performance of existing cryptographic approaches and frameworks based on secure two-party computation for matching biometric features in a privacy-preserving manner. This project will be done in collaboration with AIT.

Kontakt: Omid Mir, Rene Mayrhofer

  • Rust implementation of face detection and -recognition networks (Master project - Project in Networks and Security)

This master project helps to generalize research on face biometrics by increasing the pool of possible face detection and -recognition systems in our Rust implementation. Your task would be to research state-of-the-art systems and implement a subset of those in Rust.

Contact: Philipp Hofer

  • Evaluation of FIDO2 security key attestation

[FIDO2]( https://fidoalliance.org/fido2/ , opens an external URL in a new window ) is a standard for secure privacy-preserving cryptographic login to websites. FIDO2 tokens (or security keys) can be used as second-factor in addition to password-based login or as a standalone authentication token for [passwordless login]( https://www.yubico.com/authentication-standards/fido2/ , opens an external URL in a new window ). In order for a website to determine if a user's FIDO token is sufficiently trustworthy, tokens implement an [attestation mechanism]( https://fidoalliance.org/fido-technotes-the-truth-about-attestation/ , opens an external URL in a new window ). The goal of this thesis project is to analyze the capabilities (e.g. supported cryptographic algorithms) of current FIDO2 hardware (and software) tokens and to analyze their attestation mechanisms (particularly in terms of certificate chains).

Contact: Michael Roland

  • Evaluation of Tor relay performance

Can the Tor client experience be improved by limiting a Tor client to a subset of the available Tor relays? What criteria would be best suited to select a high-performance subset? The goal of this thesis is to answer these questions by analyzing the performance differences between Tor relays based on grouping them by publicly available attributes. Possible criteria could include (but are not limited to) the flags they have obtained (e.g. only using stable or fast relays for all connections), the port number they accept connections on, their age, their advertised bandwidth, etc.  

  • Vein recognition

In the CDL Digidow (digidow.eu) sensors can identify participating individuals based on different biometric factors. This master thesis will compare different state-of-the-art vein recognition models and extend our real-life prototype with vein recognition.

  • Privacy on Smartphones

Protecting privacy on smartphones has been recognized as a vital factor because portable devices operate nowadays with more and more sensitive personal data (location/geotags, contacts, call history, text messages, photos, physical health, etc.). The goal of this work is to extend the Android Device Security Database (which is more focused on security, see https://www.android-device-security.org/ , opens an external URL in a new window ) to privacy attributes and indicators (e.g. privacy policies, user profiling, network traffic analysis, company resolution) for various OEMs/models.

Contact: Jan Horacek

  •   Anomaly Detection in Cybersecurity

Abstract: Anomaly detection systems (such as ones implemented in EDR or IDS) are very useful tools that help blue teams, e.g., to identify exploitation of zero-day vulnerabilities. They are designed to detect (unusual) malicious activity based on events. The techniques used to find anomalies are very broad - ranging from predefined rules to deep learning methods. Furthermore, the scenarios that are relevant to this topic are quite extensive (LAN security, DDoS, UEBA, DLP, etc.). The thesis should address at least the first three points: 1. Scope: pick a scenario, explain the use cases and create appropriate test data/benchmarks (if they do not exist) 2. Methods: describe detection techniques including the underlying theory that suit the scope defined in 1. 3. Implementation: implement the techniques mentioned in 2. (preferably in python) and compare the performance, discuss the usability 4. Visualization: how to visualize events and anomalies in a system? 5. Research: improve some published results

  • Reading machine readable ID documents on Android

Abstract: The goal of this project is to create an open source implementation of an Android app to read and verify data from machine readable ID documents via NFC (such as eMRTD/electronic passport).

  • Mobile driving license reference implementation

Abstract: The goal of this project is to implement the current standard for mobile driving licenses (ISO/IEC 18013-5) on Android.

  • Physical user location model using machine learning

Abstract: Smart environments are increasing in popularity. In the CDL Digidow (digidow.eu) users can interact with various sensors in the physical world. In order to enhance the sensors ability to rapidly fulfill the users request(s), it could predict the users location and thus infer the most probable action in the future. The goal of this project is to create a prediction about the user location in the immediate future, based on various inputs, such as videos and smartphone sensors (IMU), by e.g. calculating movement vectors.

  • Security analysis of the Linux kernel in Mikrotik RouterOS

Abstract : Mikrotik RouterOS is a Linux kernel based embedded operating system for network routers, switches, access points, etc. While the userspace components are closed source, patches and configuration options for the used Linux kernel are available. The goal of this project is to analyze which security vulnerabilities - especially remotely exploitable ones - are publicly known for the user kernel version and if/how they have been patched. Necessary skills for this project include reading/writing C, reading and applying patches to source code, and compiling and testing native C code.

  • Security of e-scooters

TIER, Arolla, Wind, Lime, voi. ... after only two month e-scooters are all over Linz. The idea has been picked up pretty well and even the StVO (traffic rules) is going to be updated to bring (legal) clarity for the use of them. Besides all the positive voices, there is also quite some criticism, mainly about cityscape and safety. Above that, pushing to the market in such a short time frame also has the potential that security considerations have been left behind. Therefore, we are interested in various aspects of e-scooter security and have a few topics for master theses/projects to work on. Contact: Michael Roland

  • Tracking of persons through Wi-Fi sniffing

The goal of this project is to passively collect and analyze Wi-Fi (802.11) packets with regard to information that could be used to track or even identify an individual person. In particular, 802.11 management frames , opens an external URL in a new window such as probe requests seem to broadcast usable information. As a first step, you need to build an environment to passively collect (sniff) Wi-Fi communication and to extract the relevant data (possibly based on existing open source projects). Using that environment, you will collect and analyze data emitted from various mobile devices (particularly different smartphones, typically carried around in everyones pockets). Finally, you should be able to evaluate if that data could be used to track someone's movements around a building. Contact: Michael Roland

  • Injecting URLs and other data to Smart TVs via DVB-T

The Institute of Networks and Security has software defined radio hardware that should be suitable to create and inject DVB-T signals into receivers such as Smart TVs. The aim of this thesis is to reproduce and potentially extend the work shown in https://www.youtube.com/watch?v=bOJ_8QHX6OA , opens an external URL in a new window on how injected HbbTV URLs are automatically opened/executed on some Smart TVs to allow a remote code execution.

  • Security analysis of the communication protocol of a MAVIC PRO drone

This project aims to investigate the two communication channels (Wi-Fi and a custom RF) of a commercial drone ( http://www.dji.com/mavic?from=v3_landing_page , opens an external URL in a new window ) and analyze the used communication protocol. Using a software defined network and state-of-the-art reverse engineering tools, your goal is to find potential security weaknesses and make suggestions on how to improve the existing protocols. Contact: Rene Mayrhofer

  • Smart home security: preventing privacy leaks with home routers
  • E-Learning System für Websites am Beispiel RIS

Beispiels-Suchaufgaben mit Beobachtung des Benutzers (Eingabe, Mausbewegungen etc.) und adaptiven Reaktionen darauf (Verbesserungsvorschläge, Vorzeigen mit Maus&Eingabe + Audio-Kommentar); Zwei Varianten (ca. 10 Min. für Laien, ca. 90 Minuten für Profis) Contact: Michael Sonntag

  • Translate security protocols specified in Alice&Bob notation to Scyther language

Alice&Bob notation has been widely used to describe security protocols. However, protocol verification tools such as ProVerif, Scyther, and Tamarin have their own specification language. We are therefore interested in developing a tool that allows translating an Alice&Bob specification to other languages that can then be used as input to different verification tools. The goal of this particular task is to build a tool that translates an Alice&Bob specification to Scyther specification. As Scyther does not support equational theories that are often used to model for instance Diffie-Hellman exponentiation, not all Alice&Bob specifications are convertible to Scyther's language. Nevertheless, many protocols such as Kerberos and Needham-Schroeder variants are translatable. Contact: Jan Horacek

Johannes Kepler University Linz

Altenberger Straße 69

4040 Linz, Austria

Logo from the Audit hochschuleundfamilie

Use of cookies

Our website uses cookies to ensure you get the best experience on our website, for analytical purposes, to provide social media features, and for targeted advertising. This it is necessary in order to pass information on to respective service providers. If you would like additional information about cookies on this website, please see our data privacy policy .

Required cookies

These cookies are required to help our website run smoothly.

Name Purpose Lifetime Provider
CookieConsent This cookie saves your settings about cookie-handling at this website. 1 year JKU
se_mode This cookie is used for settings of the site search. 1 year JKU

Web statistics cookies

These cookies help us to continuously improve our services and adapt our website to your needs. We statistically evaluate the pseudonymized data collected from our website.

Name Purpose Lifetime Provider
_gcl_au This cookie is used by Google Analytics to understand user interaction with the website. 3 months Google
_ga This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors. 2 years Google
_gid This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visited in an anonymous form. 1 day Google
_gat_UA-112203476-1 This is a pattern type cookie set by Google Analytics, where the pattern element on the name contains the unique identity number of the account or website it relates to. It appears to be a variation of the _gat cookie which is used to limit the amount of data recorded by Google on high traffic volume websites. 1 minute Google
_pk_id This cookie is used to store a few details about the user such as the unique visitor ID. 13 months JKU
_pk_ses This cookie is a short lived cookie used to temporarily store data for the visit. 30 minutes JKU
_pk_ref This cookie is used to store the attribution information, the referrer initially used to visit the website. 6 months JKU

Marketing cookies

These cookies help us make our services more attractive to you as well as optimize our advertising and website content. We analyze and evaluate pseudonymised data collected from our website.

Name Purpose Lifetime Provider
_gcl_au This cookie is used by Google Analytics to understand user interaction with the website. 3 months Google
_ga This cookie is installed by Google Analytics. The cookie is used to calculate visitor, session, campaign data and keep track of site usage for the site's analytics report. The cookies store information anonymously and assign a randomly generated number to identify unique visitors. 2 years Google
_gid This cookie is installed by Google Analytics. The cookie is used to store information of how visitors use a website and helps in creating an analytics report of how the website is doing. The data collected including the number visitors, the source where they have come from, and the pages visited in an anonymous form. 1 day Google
_gac_UA-112203476-1 Contains campaign related information for the user and measures the AdWords campaign success. 90 days Google
test_cookie This cookie is set to determine if the website visitor's browser supports cookies. Doesn't contain personal identifier. 15 minutes Google
IDE This cookie carries out information about how the end user uses the website and any advertising that the end user may have seen before visiting the said website. 1 year Google
_gcl_aw This cookie is set when a user clicks an ad to reach our website. It informs about the success of campaigns and allows to connect ads to conversion targets. 3 months Google
AMCV_xx This is a pattern type cookie name associated with Adobe Marketing Cloud. It stores a unique visitor identifier, and uses an organisation identifier to allow a company to track users across their domains and services. 3 years LinkedIn
bcookie Contains a browser ID. 2 years LinkedIn
bscookie Contains a browser ID for a secure connection. 2 years LinkedIn
lang This cookie is used to store the language preference of our visitors Session LinkedIn
lidc This cookie carries out information about how the end user uses the website and any advertising that the end user may have seen before visiting the said website. 1 day LinkedIn
lissc This cookie is used to analyze how a visitor interacts with embedded services. 1 year LinkedIn
UserMatchHistory This cookie is set when a user clicks an ad to reach our website. It informs about the success of campaigns and allows to connect ads to conversion targets. 30 days LinkedIn
fr This cookie is set when a user clicks an ad to reach our website. It informs about the success of campaigns and allows to connect ads to conversion targets. 90 days Facebook
fbp This cookie is used to display advertisings, for example third-party real time offers. 90 days Facebook
sc_at This cookie is used to identify a visitor across multiple domains. 1 year Snap
sc-country This cookie is used to determine a visitor's country. 1 day Snap
uid This cookie sets a random User-ID and helps at real time bidding for display advertising to targeted audiences. 60 days Adform
C This cookie identifies if user’s browser accepts cookies. 1 – Cookies are allowed, 3 – Opt-out. 30 days Adform

University Catalog 2024-2025

Computer networking.

networking master thesis

The Master of Science in computer networking may be earned through the M.S. with thesis option or through the non-thesis option. Either option may be used as preparation for further graduate study or employment in industrial research, development or design environment, although students planning to continue on for a Ph.D. should discuss the option selected with their advisors.

The Master of Science in Computer Networking is also available as on online degree program. This degree has a non-thesis option, does not require on campus attendance, and may be used in preparation for further graduate student or employment in an industrial research, development or design environment. The program is available to USA residents and to United States military personnel serving overseas and it is offered online through Engineering Online.

Master's Degree Requirements

Computer networking core courses constitute 9 of the 30 minimum credit hours. Students take 12 additional credit hours of computer networking courses from one of four currently defined technical concentration areas: network design, network hardware, network software, or networking services. The remaining 9 credit hours may be taken from an approved management concentration sequence, as additional courses in the computer networking technical concentration areas, or as 6 hours of thesis and 3 credit hours from the list of approved computer networking courses. At least 6 of the 30 credits must come from the 700 level, and non-letter graded courses such as individual studies courses may account for a maximum of 3 credit hours.

More Information

Computer Networking Program Website

Applicant Information

  • Delivery Method: On-Campus, Online, Hybrid
  • Entrance Exam:  GRE (GRE- where required, see program website.) 
  • Interview Required: None
  • Computer Networking (MS)
  • Computer Networking (MS): Internship Concentration
  • B. Jayant Baliga
  • Mesut E. Baran
  • Salah M. A. Bedair
  • Subhashish Bhattacharya
  • Alper Yusuf Bozkurt
  • Gregory T. Byrd
  • Rada Yuryevna Chirkova
  • Mo-Yuen Chow
  • Mihail Cutitaru
  • William Rhett Davis
  • Alexandra Duel-Hallen
  • Michael James Escuti
  • Do Young Eun
  • Demitry Farfurnik
  • Brian Allan Floyd
  • Paul D. Franzon
  • John J. Grainger
  • Edward Grant
  • Robert Wendell Heath
  • Fu-Chen Hsiao
  • Brian L Hughes
  • Iqbal Husain
  • Ki Wook Kim
  • Frederick Anthony Kish Jr.
  • Robert Michael Kolbas
  • Frederick J. Livingston
  • Srdjan Miodrag Lukic
  • Leda Lunardi
  • Thomas Kenan Miller III
  • Veena Misra
  • Rainer Frank Mueller
  • John F. Muth
  • H. Troy Nagle Jr.
  • Arne Nilsson
  • Omer Oralkan
  • Mehmet Cevdet Ozturk
  • Harilaos George Perros
  • Douglas Stephen Reeves
  • James Lee Reynolds
  • Eric Rotenberg
  • Mihail Lorin Sichitiu
  • Daniel D. Stancil
  • Michael B. Steer
  • J K Townsend
  • Daryoosh Vashaee
  • John Victor Veliadis
  • Ioannis Viniotis
  • Jonathan Wierer
  • Huiyang Zhou
  • Jacob James Adams
  • Dror Zeev Baron
  • Michela Becchi
  • Aranya Chakrabortty
  • Alexander G. Dean
  • Ismail Guvenc
  • Khaled Abdel Hamid Harfoush
  • Michael W. Kudenov
  • Edgar Lobaton
  • Zeljko Pantic
  • Nuria Gonzalez Prelcic
  • David Ricketts
  • Nitin Sharma
  • Cranos M. Williams
  • Chengying Xu
  • Amay Jairaj Bandodkar
  • Michael Daniele
  • Shih-Chun Lin
  • Spyridon Pavlidis
  • Bradley Galloway Reaves
  • Muhammad Shahzad
  • Wenyuan Tang
  • Chau-Wai Wong
  • Gregory Edward Bottomley
  • Laura J. Bottomley
  • James Paul Dieffenderfer
  • Robert Joseph Evans
  • Rachana Ashok Gupta
  • Douglas C. Hopkins
  • Steven Wade Hunter
  • Steven D. Jackson
  • Bongmook Lee
  • David Lee Lubkeman
  • Robert Dwight Oden Jr.
  • Hatice Orun Ozturk
  • Veety,Elena Nicolescu
  • Tania Milkova Paskova
  • Andrew J. Rindos III
  • Elena Nicolescu Veety
  • Leonard Wilson White
  • Donna G. Yu
  • Winser E. Alexander
  • George F. Bland
  • David H. Covington
  • Tildon H. Glisson Jr.
  • John R. Hauser
  • Michael A. Littlejohn
  • David Franklin McAllister
  • Carlton M. Osburn
  • Wilbur Carroll Peterson
  • Sarah Ann Rajala
  • Wesley E. Snyder
  • Kaixiong Zhou

General introduction to computer networks. Discussion of protocol principles, local area and wide area networking, OSI stack, TCP/IP and quality of service principles. Detailed discussion of topics in medium access control, error control coding, and flow control mechanisms. Introduction to networking simulation, security, wireless and optical networking.

Prerequisite: ECE 206 or CSC 312, ST 371 , CSC 258 and Senior standing or Graduate standing

Typically offered in Fall, Spring, and Summer

Principles and issues underlying provision of wide area connectivity through interconnection of autonomous networks. Internet architecture and protocols today and likely evolution in future. Case studies of particular protocols to demonstrate how fundamental principles applied in practice. Selected examples of networked clinet/server applications to motivate the functional requirements of internetworking. Project required.

Prerequisite: CSC/ ECE 570

This course presents foundational concepts of computer and network security and privacy. It covers a wide breadth of concepts, including; Fundamentals of computer security and privacy, including security models, policies, and mechanisms; Cryptography for secure systems, including symmetric and asymmetric ciphers, hash functions, and integrity mechanisms; Authentication of users and computers; Network attacks and defenses at the network and application layers; Common software vulnerabilities and mitigation strategies; Secure operating systems and seminal access control models and policies; Principles of intrusion detection; Privacy, including considerations of end-user technologies.

Prerequisite: ( CSC 316 or ECE309) and ( CSC 401 or ECE407) or equivalent

Typically offered in Fall and Spring

Introduction to cellular communications, wireless local area networks, ad-hoc and IP infrastructures. Topics include: cellular networks, mobility mannagement, connection admission control algorithms, mobility models, wireless IP networks, ad-hoc routing, sensor networks, quality of service, and wireless security.

Prerequisite: ECE/ CSC 570

Typically offered in Spring only

Topics related to design and management of campus enterprise networks, including VLAN design; virtualization and automation methodologies for management; laboratory use of open space source and commercial tools for managing such networks.

Typically offered in Fall only

Algorithm design techniques: use of data structures, divide and conquer, dynamic programming, greedy techniques, local and global search. Complexity and analysis of algorithms: asymptotic analysis, worst case and average case, recurrences, lower bounds, NP-completeness. Algorithms for classical problems including sorting, searching and graph problems (connectivity, shortest paths, minimum spanning trees).

Prerequisite: CSC 316 and CSC 226

Basic concepts of graph theory. Trees and forests. Vector spaces associated with a graph. Representation of graphs by binary matrices and list structures. Traversability. Connectivity. Matchings and assignment problems. Planar graphs. Colorability. Directed graphs. Applications of graph theory with emphasis on organizing problems in a form suitable for computer solution.

Prerequisite: CSC 226 or MA 351 .

This course is offered alternate even years

Workload characterization, collection and analysis of performance data, instrumentation, tuning, analytic models including queuing network models and operational analysis, economic considerations.

Prerequisite: CSC 312 or ECE 206 and MA 421

Introduction for new graduate students to (a) information about graduate program, department, and university resources, and (b) research projects conducted by CSC faculty.

The study of advanced topics of special interest to individual students under direction of faculty members.

Prerequisite: Graduate standing

Thesis research.

Prerequisite: Master's student

This course deals with the signal processing principles underlying recent advances in communications and networking. Topics include: smart-antenna and multi-input multi-output (MIMO) techniques; multiuser communication techniques (multiple access, power control, multiuser detection, and interference managment); signal processing in current and emerging network applications such as cognitive radio and social networks. Knowledge of linear alegbra and stochastic analysis is required.

Print Options

Send Page to Printer

Print this page.

Download Page (PDF)

The PDF will include all information unique to this page.

2024-2025 Undergraduate Catalog

A PDF of the entire 2024-2025 Undergraduate catalog.

2024-2025 Graduate Catalog

A PDF of the entire 2024-2025 Graduate catalog.

Dissertation Help UK : Online Dissertation Help

Click here to place an order for topic brief service to get instant approval from your professor.

Best 59 Networking Dissertation Topics Ideas & Examples

Table of Contents

The Most Conclusive Networking Dissertation Topics That Will Help Students in writing their Final Year Dissertations

In recent years, Networking has grown by leaps and bounds.

Networking is a complicated term.  It has evolved over the years after the advent of the computer. In information technology, networking is the construction, design, and use of a network, including the physical (cabling, hub, bridge, switch, router, and so on), the selection and use of telecommunication protocol and computer software for using and managing the network, and the establishment of operation policies and procedures related to the network. The basic purpose of networking is the sharing of information and is based on a reliable and fast communication network.

Importance of Networking

Inevitably,  networking has taken the center stage  in the world. The different kinds of networking systems i.e.  local area networking , working in a particular locality within a radius of a few kilometers; metropolitan area networking , working in a large city; and  wide area networking , covering thousands of kilometers in the radius are in place. No one can live without it, for everything is now interconnected and dependent on one another. Hence any failure in communication can lead to a massive disorder.

Networking Dissertation Topics Ideas

This importance of  networking gives a good prospect to any student who specializes in networking . Networking dissertation then becomes inevitable for them. However, there starts the confusion as to which topic should be selected. Nonetheless, in the topic selection for the dissertation, students must prefer the current requirement of networking. They may take general topics as well as social networking dissertation topics.

This not only helps them to create their interest in the dissertation but also helps the world community to protect vulnerable networking issues. Some of the important and appealing/interesting networking dissertation topics are listed below.

  • The impact of 5G technology on mobile networks
  • The use of software-defined networking in data centers
  • The security of IoT networks
  • The use of network virtualization in cloud computing
  • The impact of edge computing on network architecture
  • The use of network function virtualization in telecommunications
  • The security of industrial control systems networks
  • The use of network slicing in 5G networks
  • The impact of artificial intelligence on network management
  • The use of network-as-a-service in cloud computing
  • The security of wireless networks
  • The use of network coding in wireless networks
  • The impact of network traffic on network performance
  • The use of network-on-chip in embedded systems
  • The security of software-defined networks
  • The use of network function chaining in 5G networks
  • The impact of blockchain technology on network security
  • The use of network orchestration in 5G networks
  • The security of mesh networks
  • The use of network-attached storage in cloud computing
  • The impact of quantum computing on network security
  • The use of network-as-a-platform in cloud computing
  • The security of mobile ad-hoc networks
  • The use of network-on-demand in cloud computing
  • The impact of AI-based network optimization and automation on network performance.
  • The importance of networking in the current era
  • The history of the wireless networks
  • The future prospect of the wireless networks
  • How has networking become inevitable in present times?
  • Analyzing the rapid increase in the market for the wireless networking
  • Comparing wireless and wire-based networks – which one is more important
  • Giving an overview of the terms, technology, and legal issues in the wireless networking
  • How is networking important in an institution
  • An overall categorization of networking systems
  • The different aspects of networking: pros and cons
  • The newly arising security issues in the networking
  • The new technical aspects which allow people to communicate with machines
  • The inflow of different social networks
  • How to improve the security of networks i.e. protection of intellectual property rights etc
  • Design a secure scheme for data transmission in opportunistic routing in wireless sensor networks
  • The novel method for congestion avoidance in mobile ad hoc networks to maintain quality of service in the network ‘
  • Comparing three wireless networking types i.e. LAN, WAN, and MAN
  • The importance of wireless networks in mobile communications
  • The fundamental working of broadband and Bluetooth technologies
  • The world economy and the input of networking
  • The importance of networking in the internet industry
  • How are the security issues affecting the banking industry?
  • Networking – indispensable for the marketing
  • The growth of media and the networking
  • Online competitions
  • The new conferencing trends i.e. video conferencing
  • The different concepts of network management

Other related posts

  • IT Dissertation Topics
  • Computer science dissertation topics
  • Information systems dissertation topics

Custom Topics Brief Service from experts

These are the best networking dissertation topics if you are still searching for some unique dissertation topics on networking fill out the form below and get we customize dissertation topic brief service from our experts.

Paid Topic Mini Proposal (500 Words)

You will get the topics first and then the mini proposal which includes:

  • An explanation why we choose this topic.
  • 2-3 research questions.
  • Key literature resources identification.
  • Suitable methodology including raw sample size and data collection method
  • View a Sample of Service

Note: After submitting your order please must check your email [inbox/spam] folders for order confirmation and login details. If the email goes in spam please mark not as spam to avoid any communication gap between us.

Get An Expert Dissertation Writing Help To Achieve Good Grades

By placing an order with us, you can get;

  • Writer consultation before payment to ensure your work is in safe hands.
  • Free topic if you don't have one
  • Draft submissions to check the quality of the work as per supervisor's feedback
  • Free revisions
  • Complete privacy
  • Plagiarism Free work
  • Guaranteed 2:1 (With help of your supervisor's feedback)
  • 2 Instalments plan
  • Special discounts

Other Posts

  • 39 Environmental Economics Dissertation Topics Ideas and Samples March 15, 2022 -->
  • 39 Event Management Dissertation Topics Ideas February 12, 2022 -->
  • 39 Experimental economics dissertation topics Ideas March 16, 2022 -->
  • 39 Financial Economics Dissertation Topics Ideas March 17, 2022 -->
  • 39 Health economics dissertation topics Ideas and Examples March 14, 2022 -->
  • 39 Hospitality Management Dissertation Topics Ideas February 19, 2022 -->
  • 39 Information Systems Dissertation Topics Ideas February 20, 2022 -->
  • 39 Marketing Management Dissertation Topics Examples February 12, 2022 -->
  • 39 Oil and Gas Management Dissertation Topics February 22, 2022 -->
  • 39 Portfolio Management Dissertation Topics March 4, 2022 -->
  • 39 Retail Management Dissertation Topics Ideas March 6, 2022 -->
  • 39 Sports Management Dissertation Topics Ideas February 22, 2022 -->
  • 39 Sports Tourism Dissertation Topics Ideas February 14, 2022 -->
  • 39 Sustainable Tourism Dissertation Topics Ideas February 16, 2022 -->
  • 39 Talent Management Dissertation Topics Examples March 8, 2022 -->
  • 39 Travel and Tourism Dissertation Topics Ideas February 14, 2022 -->
  • 45 Human Rights Dissertation Topics Ideas & Examples February 7, 2020 -->
  • 47 Best Research Proposal Topics in Logistics March 1, 2022 -->
  • 49 Biochemistry Dissertation Topics Ideas and Examples February 9, 2022 -->
  • 49 Risk Management Dissertation Topics Ideas & examples February 27, 2020 -->
  • 49 Waste Management Dissertation Topics Ideas February 27, 2020 -->
  • 53 Best Autism Dissertation Topics & Autism Dissertation Ideas November 18, 2021 -->
  • 53 Best Dissertation topics on domestic violence & Examples November 30, 2021 -->
  • 53 Sports Dissertation Topics and examples in 2023 March 17, 2020 -->
  • 54 Best Development Studies Dissertation Topics Ideas & Samples November 23, 2021 -->
  • 56 Best Critical Care Nursing Research Topics ideas with examples November 18, 2021 -->
  • 57 Best Ecommerce Research Topics Ideas and Examples November 30, 2021 -->
  • 57 Best Forensic Science Dissertation Topics in 2023 March 17, 2020 -->
  • 57 Best Real Estate Dissertation Topics in 2023 March 16, 2020 -->
  • 57+ Best Health and Social Care Dissertation Topics in 2023 March 16, 2020 -->

WhatsApp and Get 35% off promo code now!

  • Bibliography
  • More Referencing guides Blog Automated transliteration Relevant bibliographies by topics
  • Automated transliteration
  • Relevant bibliographies by topics
  • Referencing guides

Thesis and Research Topics in Computer Networking?

Most recent answer.

networking master thesis

  • .....RESEARCH TOPIC_D.Prokopowicz_Improving security, procedures and techniques to protect sensitive information residing...computer networks. ...jpg 322 kB

Popular answers (1)

networking master thesis

  • anatol_badach_top_10_networking_trends_researchga te.jpg 198 kB

Top contributors to discussions in this field

Dariusz Prokopowicz

  • Cardinal Stefan Wyszynski University in Warsaw 🏛️

D A Gayan Nayanajith

  • University of Kelaniya

Aref Wazwaz

  • Dhofar University

Nidhal Kamel Taha El-Omari

  • The World Islamic Science and Education University (WISE)

Ljubomir Jacić

  • Technical College Požarevac

Get help with your research

Join ResearchGate to ask questions, get input, and advance your work.

All Answers (12)

networking master thesis

  • Wireless Sensor Networks
  • Wireless Ad hoc Network
  • Vehicular Ad hoc Networks
  • Network Security

Similar questions and discussions

  • Asked 25 June 2023

Samta Balpande

  • Asked 13 May 2023

Onengiyeofori Fenibo

  • Asked 24 April 2023

Nipuna Sankalpa

  • Asked 26 February 2023

Hussain Mowahedi

  • Asked 23 February 2023

Wisam Makki Alwash

  • Asked 27 August 2022

Havishka Halangoda

  • Asked 4 February 2022

Najim Halloum

  • Asked 22 September 2021

Jawwad Azam

  • Asked 25 August 2021

Ziyam Santhosh

Related Publications

Hsin Wen-Jung

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

Naval Postgraduate School

Center for Cybersecurity and Cyber Operations

Dissertations and theses - center for cybersecurity and cyber operations, ph.d. dissertations and master's theses.

The thesis and PhD dissertations are the capstone achievements of a student's academic endeavors at NPS. A permanent copy of these documents are placed in the  Dudley Knox Library 's digital archives. The Library holds all NPS theses and dissertations.

If you have any questions or would like additional information on Faculty and Student Research at NPS, please e-mail  [email protected] .

Material contained herein is made available for the purpose of peer review and discussion and does not necessarily reflect the views of the Department of the Navy or the Department of Defense.

Orwat, M., "A Decision Framework for Enhancing MANET Stability and Security," Doctorial Dissertation, Naval Postgraduate School, June 2008. 

Shaffer, A., "An Application Of Alloy To Static Analysis For Secure Information Flow And Verification Of Software Systems," Doctorial Dissertation, Naval Postgraduate School, December 2008.

Afinidad, F. B., "An Interval Algebra-Based Temporal Access Control Protection Architecture," Doctoral Dissertation, Naval Postgraduate School, June 2005.

Bibighaus, D. L., "Applying Doubly Labeled Transition Systems to the Refinement Paradox," Doctoral Dissertation, Naval Postgraduate School, September 2005. 

VanPutte, M., "A Computational Model and Multi-Agent Simulation of the INFOSEC Domain," Doctoral Dissertation, Naval Postgraduate School, June 2002. 

Franconia, Jamie C., Mitigating Insider Threats in Virtual Environments with Deception Detection , Master's Thesis, Naval Postgraduate School, June 2021. 

Pommer, P., Design and Implementation of a Distributed Ledger to Support Data Survivability in an Unmanned Multi-Vehicle System , Master's Thesis, Naval Postgraduate School, March 2021. 

Richardson, T., Learning Objective Based Development of CyberCIEGE Instructional Video Game Scenarios , Master's Thesis, Naval Postgraduate School, Monterey, CA, June 2021.

H. Rosario, H., CyberCIEGE Videos: From English to Spanish; V ́ıdeos de CyberCIEGE: Del Ingl ́es al Espan ̃ol , Master’s thesis, Naval Postgraduate School, Monterey, California, June 2021.

Carter, N., Design and Verification of a Distributed Ledger Protocol for Distributed Autonomous Systems Using Monterey Phoenix , Master's Thesis, Naval Postgraduate School, December 2020. 

 H. T. Cheer, Choice Confidence and Persuasion Resistance Through Mouse Action Observation,” M.S. thesis, Naval Postgraduate School, Monterey, California, December 2020

Dougherty, J. T.,  Evasion Of Honeypot Detection Mechanisms Through Improved Interactivity Of ICS- Based Systems , M.S. Thesis, Naval Postgraduate School, Monterey, California, September 2020

Harter, G.,  Metamorphic and Polymorphic Techniques For Obfuscation Of K-Ary Malicious Codes , Master’s thesis, Naval Postgraduate School, Monterey, California, March 2020.

Martineau, J.,   Mapping Mobile IPv6 Providers , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2020

Moore, G. M., Blockgrid – A Blockchain-Mediated Cyber-Physical Instructional Platform , Master's Thesis, Naval Postgraduate School, Monterey, CA, December 2020.

Purser, J.,  Using Generative Adversarial Networks For Intrusion Detection In Industrial Control Systems,  Master’s thesis, Naval Postgraduate School, Monterey, California, December 2020

Norton, G., Security Analysis of Industrial Security Appliances, Master's Thesis, Naval Postgraduate School, Monterey, CA, September 2020. 

Thordarson, K.E., Analysis Of EUI-64 Based Addressing And Associated Vulnerabilities, Master’s thesis, Naval Postgraduate School, Monterey, California, September 2020

Walker, M.H.,  The Science Of Speech: Developing A Computational Model For Digital Communication And Its Ramifications For Author Identification In Cybersecurity,  Master’s thesis, Naval Postgraduate School, Monterey, California, March 2020.

Wikman, E., Static Analysis Tools for Detecting Stack-based Buffer Overflows , Master's Thesis, Naval Postgraduate School, Monterey, CA, June 2020. 

Hardt, A.,  Characterizing BBP Community Irregularities Towards An Anomaly Detection Engine, M.S. Thesis, Naval Postgraduate School, Monterey, California, September 2019

Kalinowski, P. Neural Networks for Malware Detection Using Static Analysis , M.S. thesis, Naval Postgraduate School, Monterey, California, March 2019

Kvitchko, T., Sunup: ICMP Timestamp Behaviors In Fingerprinting , M.S. Thesis, Naval Postgraduate School, Monterey, California, September 2019

Sowers, R. and Rogers, A., Defensive Binary Code Instrumentation To Protect Against Buffer Overflow Attacks,  Master’s thesis, Naval Postgraduate School, Monterey, California, September 2019.

Affield, D. W., McPherson, P.C., and  Budzitowski, D.E, Cloaking Malware with Respect to Static Analysis, Master’s thesis, Naval Postgraduate School, Monterey, California, September 2018.

Alcorn, D.R., Educational Guidance on Extensible Software Development,  Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2018.

Atadika, M. K,  Applying U.S. Military Cybersecurity Policies to Cloud Architectures , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2018.

Austin, S., Security Analysis of Industrial Firewalls , Master's Thesis, Naval Postgraduate School, Monterey, CA, December 2018. 

Garcia, D., (on distribution hold), Master's Thesis, Naval Postgraduate School, Monterey, CA, September 2018.

Gentile, B. Officer Data Card (ODC) Dissemination Policy, Model and Blockchain-based Accountability Mechanism ,  Master's Thesis, Naval Postgraduate School, Monterey, CA, June 2018.

Glasser, D. P.,   Longitudinal Study of Large-Scale Traceroute Results , Master’s Thesis, Naval Postgrad- uate School, Monterey, California, March 2018.

Hyun, D.,   Collecting Cyberattack Data for Industrial Control Systems with Honeypots,  M.S. Thesis, Naval Postgraduate School, Monterey, California, March 2018.

Shaw, M., A Blockchain Testbed for DoD Applications, Master's Thesis, Naval Postgraduate School, Monterey, CA, September 2018.

Timmerman, M., Enabling Collaboration and Visualization of Complex Operational Technology Computer Networks and Augmented Reality Technology , Master's Thesis, Naval Postgraduate School, Monterey, CA, September 2018. 

Wanic, E.E.,  Cyber Weapons and Deterrence , M.S. Thesis, Naval Postgraduate School, Monterey, California, September 2018.

Ballesteros, P.R.,  Investigating background pictures for picture gesture authentication , Master’s Thesis, Naval Postgraduate School, Monterey, California, June 2017.

Banuelos, C. A., Development of information assurance protocol for low bandwidth nanosatellite communications , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2017.

Fessler, K. E., Analysis of space based infrared system (sbirs) block 10 ground segment cybersecurity , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2017.

Gormley, J., Fuzz Testing of Industrial Network Protocols in Programmable Logic Controllers , Naval Postgraduate School, Monterey, CA, December, 2017. 

Khosalim, J.   Implementation of a Parameterization Framework for Cybersecurity Laboratories , Master's Thesis, Naval Postgraduate School, Monterey, CA, March, 2017. 

Fischer, B. D. and Lato, A. M.,  A taxonomy for software-defined networking, man-in-the-middle attacks , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2016.

Foster, H.,  “Why does MPTCP have to make things so complicated?”: cross-path NIDS evasion and countermeasures , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2016.

McKenna, S., Detection and classification of web robots with honeypots , Master’s Thesis, Naval Postgraduate School, Monterey, California, March 2016.

Shing, L., An improved tarpit for network deception, Master’s Thesis, Naval Postgraduate School, Monterey, California, March 2016.

Tacliad, F., ENIP fuzz: A scapy-based ethernet/ip fuzzer for security testing , Master’s Thesis, Naval Postgraduate School, Monterey, California, September 2016.

Yee, J., Characterizing crowd participation and productivity of foldit through web scraping,  Master’s Thesis, Naval Postgraduate School, Monterey, California, March 2016.

Master's Theses 2014

David Bergesen, D., A Prioritization Matrix for Intelligence Feeds to the Distributed Common Ground System – Navy (DCGS-N) , Master's Thesis, Naval Postgraduate School, Monterey, CA, March 2014. 

Theses 2013

Doucet, R., Dontchev, D. M., Burden, J. and Skoff T., Big Data Analytics Test Bed,  Master's Capstone Project Report, Naval Postgraduate School, September 2013.

Theses 2012

Wolf. S., Non-Digital Games for Computer Security Concepts, Master's Thesis, Naval Postgraduate School, December, 2012.

Swisher, D., Automated Policy Updating Using a Semantic Wiki,  Master's Thesis, Naval Postgraduate School, December, 2012.

Rimando, R., Development and Analysis of Security Policies in Security Enhanced Android , Master's Thesis, Naval Postgraduate School, December, 2012.

McGrath, G., Function Matching Using Similiarity Metrics , Master's Thesis, Naval Postgraduate School, December, 2012.

Edgar, S., Symbolic Execution from an Emulator ,  Master's Thesis, Naval Postgraduate School, December, 2012.

Delaroderie, J., Clustering Similarity Digest Bloom Filters in Self-Organizing Maps , Master's Thesis, Naval Postgraduate School, December, 2012.

Hom, M., Symbolic Execution Over Native X86 , Master's Thesis, Naval Postgraduate School, June, 2012.

Hirst, N., The Implications of Virtual Machine Introspection for Digital Forensics on Non-Quiescent Virtual Machines,  Master's Thesis, Naval Postgraduate School, June, 2012.

Biblarz, A., Web Syndication in a Multilevel Security Environmen t, Master's Thesis, Naval Postgraduate School, April, 2012.

Tan, Hwee Meng, USB Support for the Least Privilege Separation Kernel , Master's Thesis, Naval Postgraduate School, March 2012.

Theses 2011

Kostopoulos, S., A Concept for Continuous Monitoring That Reduces Redundancy in Information Assurance Processes , Master's Thesis, Naval Postgraduate School, September 2011.

Theses 2010

Ang, K. K., "A Multilevel Secure Constrained Intrusion Detection System Prototype," Master's Thesis, Naval Postgraduate School, December 2010. 

Beech, Z. W. , "A Formal Security Model for Emergency Access to Information," Master's Thesis, Naval Postgraduate School, June 2010. (Abstract/PDF not available at this time)

Guillen, J., "Least Privilege Separation Kernel Storage Hierarchy Prototype For The Trusted Computing Exemplar Project," Master's Thesis, Naval Postgraduate School, June 2010. 

Martinsen, J., "Implementation Of Intel Virtual Machine Extension Root Operation On The NPS Least Privilege Separation Kernel," Master's Thesis, Naval Postgraduate School, September 2010. 

Ng, Y.C., "An Application for Normal and Critical Operations in a Tactical MLS System," Master's Thesis, Naval Postgraduate School, December 2010.

O'Connell, R., Descovich, C., "Decreasing Variance In Response Time To Singular Incidents Of Piracy In The Horn Of Africa Area Of Operation," Master's Thesis, Naval Postgraduate School, June 2010. 

Quah, R., "Securing Emergency State Data in a Tactical Computing Environment," Master's Thesis, Naval Postgraduate School, December 2010. 

Quek, C. L., "A Configuration Framework And Implementation For The Least Privilege Separation Kernel," Maste'rs Thesis, Naval Postgraduate School, December 2010. 

Toh, B.P., "Design And Implementation Of An Audit Subsystem For A Separation Kernel," Master's Thesis, Naval Postgraduate School, December 2010. 

Yoong, H. L., "IP Services Design and Implementation in a Prototype Device for Transient Tactical Access to Sensitive Information," Master's Thesis, Naval Postgraduate School, December 2010. 

Theses 2009

Cowan-Sharp, J. "A Study of Topic and Topic Change in Conversational Threads," Master's Thesis, Naval Postgraduate School, September 2009. 

Farrell, P. F., "A Framework For Automated Digital Forensic Reporting," Master's Thesis, Naval Postgraduate School, March 2009. 

Mok, C., "National Authentication Framework Implementation Study," Master's Thesis, Naval Postgraduate School, December 2009. 

Regan, J. E., "The Forensic Potential of Flash Memory," Master's Thesis, Naval Postgraduate School, September 2009. 

Roussas, G., "Visualization Of Client-Side Web Browsing And Email Activity," Master's Thesis, Naval Postgraduate School, June 2009. 

Skaff, S. J. C., "Probability Distributions Over Cryptographic Protocols," Master's Thesis, Naval Postgraduate School, June 2009. 

Slack, A. A., "Digital Authentication For Official Bulk Email," Master's Thesis, Naval Postgraduate School, March 2009. 

Venema, J. P., Shu, J. L. Y., "Investigation Into The Impacts Of Migration To Emergent Nsa Suite B Encryption Standards," Master's Thesis, Naval Postgraduate School, June 2009. 

Welliver, T. M., "Configuration Tool Prototype for the Trusted Computing Exemplar Project," Master's Thesis, Naval Postgraduate School, December 2009. 

Theses 2008

Adams, C. M., "VOIP Quality Measurements in a Multilevel Secure (MLS) Environment," Master's Thesis, Naval Postgraduate School, Monterey, California, March 2008. 

Adams, Paige, "Conversion Thread Extraction and Topic Detection in Text-Based Chat," Master's Thesis, Naval Postgraduate School, June 2008. 

Bassi, S. D., "An Automated Acquisition System for Media Exploitation," Master's Thesis, Naval Postgraduate School, Monterey, California, June 2008. 

Huynh, Daniel P., "Exploring and validating data mining algorithms for use in data ascription," Master's Thesis, Naval Postgraduate School, June 2008. 

Koh, C. L. and Ng, E. S., "Security Modeling and Correctness Proof Using Specware and Isabelle," Master’s thesis, Naval Postgraduate School, Monterey, CA, December 2008. 

LaVelle, C., "A Preliminary Analysis for Porting XML-Based Chat to MYSEA," Master's Thesis, Naval Postgraduate School, June 2008. 

McLaren, Simon R., "Reliability of iris recognition as a means of identity verification and future impact on transportation worker identification credential," Master's Thesis, Naval Postgraduate School, March 2008. 

Migletz, James J., "Automated metadata extraction," Master's Thesis, Naval Postgraduate School, June 2008. 

Tenhunen, T. F., "Implementing an Intrusion Detection System in the MYSEA Architecture," Master's Thesis, Naval Postgraduate School, June 2008. 

Theses 2007

Carter, D. W., "An Oskit-Based Implementation Of Least Privilege Separation Kernel Memory Partitioning," Master's Thesis, Naval Postgraduate School, June 2007. 

Eatinger, C., "Testing Automation Tools For Secure Software Development," Master's Thesis, Naval Postgraduate School, June 2007. 

Goh, H. C., "Intrusion Deception in Defense of Computer Systems," Master's Thesis, Naval Postgraduate School, March 2007. 

McManus, S. C., "Predicting Host Level Reachability via Static Analysis of Routing Protocol Configuration," Master's Thesis, Naval Postgraduate School, September 2007. 

Murphy, E. J. "Counterintelligence Through Malicious Code Analysis," Master's Thesis, Naval Postgraduate School, June 2007.  Ong, K. L., "Design And Implementation Of Wiki Services In A Multilevel Secure Environment," Master's Thesis, Naval Postgraduate School, December 2007. 

Phelps, D. A., "Alloy Experiments For A Least Privilege Separation Kernel," Master's Thesis, Naval Postgraduate School, June 2007.   Pohl, M., "Experimentation And Evaluation Of Ipv6 Secure Neighbor Discovery Protocol," Master's Thesis, Naval Postgraduate School, September 2007. 

Portner, A. D., "A Prototype Of Multilevel Data Integration In The MYSEA Testbed," Master's Thesis, Naval Postgraduate School, September 2007. Wiese, B., "Preliminary Analysis Of A Trusted Platform Module (TPM) Initialization Process," Master's Thesis, Naval Postgraduate School, June 2007. 

Theses 2006

Bradney, J. A., "Use Of Webdav To Support A Virtual File System In A Coalition Environment," Master's Thesis, Naval Postgraduate School, June 2006.   Chew, Heng Hui, "A Secure Alert System," Master's Thesis, Naval Postgraduate School, December 2006. 

Chiang, K. H., "A Prototype Implementation Of A Time Interval File Protection System (TIFPS) In Linux," Master's Thesis, Naval Postgraduate School, September 2006. 

Cone, B. D., "A CyberCIEGE Campaign Fulfilling Navy Information Assurance Training And Awareness Requirements," Master's Thesis, Naval Postgraduate School, March 2006. 

Cullum, J. J., "Performance Analysis Of Automated Attack Graph Generation Software," Master's Thesis, Naval Postgraduate School, December 2006.

DeCloss, D. P., "An Analysis Of Specware And Its Usefulness In The Verification Of High Assurance Systems," Master's Thesis, Naval Postgraduate School, June 2006.   Duong, B. T., "Comparisons Of Attacks On Honeypots With Those On Real Networks," Master's Thesis, Naval Postgraduate School, March 2006.   Egan, M., "An Implementation Of Remote Application Support In A Multilevel Environment," Master's Thesis, Naval Postgraduate School, March 2006.  Ellch, Jonathan P., "Fingerprinting 802.11 devices," Master's Thesis, Naval Postgraduate School, September 2006. 

Estlund, M. J., "A Survey And Analysis Of Access Control Architectures For Xml Data," Master's Thesis, Naval Postgraduate School, March 2006.   Lim, S. H., "Assessing the Effects of Honeypots on Cyber-Attackers," Master's Thesis, Naval Postgraduate School, December 2006. 

Radowicz, Jody L., "Exploring fields with shift registers," Master's Thesis, Naval Postgraduate School, September 2006.

Urrea, J. M., "An Analysis Of Linux Ram Forensics," Master's Thesis, Naval Postgraduate School, March 2006. 

Wiberg, K. C., "Identifying Supervisory Control And Data Acquisition (SCADA) Systems On A Network Via Remote Reconnaissance," Master's Thesis, Naval Postgraduate School, September 2006. 

Theses 2005 Barwinski, M., "Taxonomy Of Spyware And Empirical Study Of Network Drive-By-Downloads," Master's Thesis, Naval Postgraduate School, September 2005.  Bui, S., "Single Sign-On Solution For MYSEA Services," Master's Thesis, Naval Postgraduate School, September 2005.  Cassidy, R. H. F., "Automating Case Reports For The Analysis Of Digital Evidence," Master's Thesis, Naval Postgraduate School, September 2005.   Chua, C., "A CyberCIEGE Scenario Illustrating Software Integrity And Management Of Air-Gapped Networks In A Military Environment," Master's Thesis, Naval Postgraduate School, December 2005. 

Cooper, R. C., "Remote Application Support in a Multi-Level Environment," Master's Thesis, Naval Postgraduate School, March 2005.  Craft, B. A. Jr., "Investigation Into the Potential Efficiencies and Added Security Provided by Employing RFID Technology To Monitor the Production of Materials," Master's Thesis, Naval Postgraduate School, September 2005.  Gonzales, D. V., "An Analysis Of Automated Solutions For The Certification And Accreditation Of Navy Medicine Information Assets," Master's Thesis, Naval Postgraduate School, September 2005.   Horn, J. F., "IPSec-Based Dynamic Security Services for the MYSEA Environment," Master's Thesis, Naval Postgraduate School, June 2005.  Kane, D. R., "Web-Based Dissemination System for the Trusted Computing Exemplar Project," Master's Thesis, Naval Postgraduate School, June 2005.  

Labbe, K. G., "An Evaluation of Two Host-Based Intrusion Prevention Systems," Master's Thesis, Naval Postgraduate School, June 2005.  Lysinger III, J.E., "Multilevel Print Server Requirements for DoN Application," Master's Thesis, Naval Postgraduate School, June 2005. (Access to this thesis is restricted)  Mikus, N. A., "An Analysis of Disc Carving Techniques"," Master's Thesis, Naval Postgraduate School, March 2005.  Mun, N. C., "A CyberCIEGE Scenario To Illustrate Classified Information Management In Multilevel Secure Systems For Military Command And Control," Master's Thesis, Naval Postgraduate School, December 2005. 

Noonan, R. J., "Vulnerability Assessment of the SLC 5/05 Programmable Controller (U)," Master's Thesis, Naval Postgraduate School, June 2005. (Access to this thesis is restricted))

Ruppar, C. A., "Identity Theft Prevention In CyberCIEGE," Master's Thesis, Naval Postgraduate School, December 2005.   Tan, N. K., "A Firewall Training Program Based On CyberCIEGE," Master's Thesis, Naval Postgraduate School, December 2005. 

Todd P. Anderson, (Classified), Master's Thesis, Naval Postgraduate School, December 2005. Mueller, D. S., "Authentication Scenario For Cyberciege," Master's Thesis, Naval Postgraduate School, September 2005.  Tse, L., "Feasibility Study of VOIP Integration into the MYSEA Environment," Master's Thesis, Naval Postgraduate School, September 2005. Vernon, R. C., "A Design For Sensing The Boot Type Of A Trusted Platform Module Enabled Computer," Maste'rs Thesis, Naval Postgraduate School, September 2005. 

Theses 2004 Ambers, V. P., and Kelly, A. M., "Installation, Configuration and Operational Testing of a PKI Certificate Server and its Supporting Services," Master's Thesis, Naval Postgraduate School, June 2004.  Athanasopoulos, V., "Design and Development of a Web-Based DOD PKI Common Access Card (CAC) Instruction Tool," Master's Thesis, Naval Postgraduate School, March 2004.   Baumgartner, T. J., and Phillips, M. D. W., "Implementation of a Network Address Translation Mechanism Over IPV6," Master's Thesis, Naval Postgraduate School, June 2004.  

Burrows, D., and Lemott Jr., D., "Evaluation of the 3COM Embedded Firewall System and its Role in Protection Against Distributed Denial of Service (DDOS) Attacks," Master's Thesis, Naval Postgraduate School, September 2004. (Access to this thesis is restricted)

Christensen, R. R., (Classified), Master's Thesis, Naval Postgraduate School, June 200

Cisneros, J. J., (Classified), Master's Thesis, Naval Postgraduate School, June 2004

Clark J. L., "High Assurance Project Evidence Presentation Using Semantic Graphs in XML," Master's Thesis, Naval Postgraduate School, March 2004

Craven, D. S., "A Formal Analysis of the MLS LAN: TCB-To-TCBE, Session Status, and TCBE-T0-Session Server Protocols," Master's Thesis, Naval Postgraduate School, September 2004.  

Dodge, C. A., "Recommendations for Secure Initialization Routines in Operating Systems," Master's Thesis, Naval Postgraduate School, September 2004.  

Fielk, K. W., "CyberCIEGE Scenerio Illustrating Integrity Risks to a Military Like Facility," Master's Thesis, Naval Postgraduate School, September 2004.  

Gross, M. E., "Configuration Management Evaluation Guidance for High Robustness Systems," Master's Thesis, Naval Postgraduate School, March 2004.

Guild, J., "Scripting Quality of Security Service (QoSS) Safeguard Measures for the Suggested INFOCON System," Master's Thesis, Naval Postgraduate School, March 2004.  Guild, J. R., "Design and Analysis of a Model Reconfigurable Cyber-Exercise Laboratory (RCEL) for Information Assurance Education," Master's Thesis, Naval Postgraduate School, March 2004.  Hart, D., "An Approach To Vulnerability Assessment For Navy Supervisory Control And Data Acquisition (Scada) Sytems," Master's Thesis, Naval Postgraduate School, September 2005. 

Herbig, C. F., "Use of OpenSSH Support for Remote Login to a Multilevel Secure System," Master's Thesis, Naval Postgraduate School, December 2004.  Hilchie, A. T., "A Trusted Path Design and Implementation for Security Enhanced Linux," Master's Thesis, Naval Postgraduate School, September 2004. Johns, Jr. K. W., "Toward Managing and Automating CyberCIEGE Scenario Definition File Creation," Master's Thesis, Naval Postgraduate School, March 2004. 

Lamorie, J., "A CyberCIEGE Scenario Illustrating Secrecy Issues in an Internal Corporate Network Connected to the Internet," Master's Thesis, Naval Postgraduate School, September 2004.  LaMore, R.L., "CyberCIEGE Scenario Illustrating Secrecy Issues Through Mandatory and Discretionary Access Control Policies in a Multi-Level Security Network," Master's Thesis, Naval Postgraduate School, June 2004.  Meyer, M.K., "A CyberCIEGE Scenario Illustrating Multilevel Secrecy Issues in an Air Operations Center Environment," Master's Thesis, Naval Postgraduate School, June 2004.  Nguyen, L. K., "Predicting Catastrophic BGP Routing Instabilities," Master's Thesis, Naval Postgraduate School, March 2004. 

Phan, K. Q., "Design and Implementation of NFS for a Multilevel Secure System," Master's Thesis, Naval Postgraduate School, March 2004. 

Rogers, J., "Secure Distribution of Open Source Information," Master's Thesis, Naval Postgraduate School, December 2004. 

Rowlands, D., and Shumaker, T., "Risk assessment of the Naval Postgraduate School Gigabit Network, Master's Thesis, Naval Postgraduate School, Monterey, California, September 2004.

Sears, J. D., "Simultaneous Connection Management and Protection in a Multilevel Security Environment," Master's Thesis, Naval Postgraduate School, September 2004. 

Sherman, M. A., "An Analysis of VPN Solutions and Best Practices for Use in Conjunction with Cyber Attack and Defend Exercises," Master's Thesis, Naval Postgraduate School, September 2004.  Ward, M. P., "An Architectural Framework for Describing Supervisory Control and Data Acquisition (SCADA) Systems," Master's Thesis, Naval Postgraduate School, September 2004. 

Wee, O. K., "Wireless Network Security: Design Considerations For An Enterprise Network," Master's Thesis, Naval Postgraduate School, March 2004.

Theses 2003 Alageel, S. M., "Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)," Master's Thesis, Naval Postgraduate School, June 2003.

Bailey, C. F., "Analysis of Security Solutions in Large Enterprises," Master's Thesis, Naval Postgraduate School, June 2003.  Carrillo, C. M., "Continuous Biometric Authentication for Authorized Aircraft Personnel: A Proposed Design," Master's Thesis, Naval Postgraduate School, June 2003.

Galante, V. J., "Feasibility of Automatic FIWC Website Noncompliance Monitoring and Enforcement Activities," Master's Thesis, Naval Postgraduate School, June 2003.  MacMichael Jr., J. L., "A Survey and Security Strength Classification of PKI Certificate Revocation Management Implementations," Master's Thesis, Naval Postgraduate School, December 2003. 

O'Neal, M. R., "A Design Comparison Between IPV4 and IPV6 in the Context of MYSEA, and Implementation of an IPV6 MYSEA Prototype," Master's Thesis, Naval Postgraduate School, June 2003. 

Teo, T. L., "Scenario Selection And Student Assessment Modules For CyberCIEGE," Master's Thesis, Naval Postgraduate School, Monterey, December 2003.   Ubhayakar, S. S., "Evaluation of Program Specification and Verification Systems," Master's Thesis, Naval Postgraduate School, June 2003. 

Theses 2002

Anderson, E., A Demonstration of the Subversion Threat: Facing a Critical Responsibility in the Defense of Cyberspace,  Master's Thesis, Naval Postgraduate School, March 2002. 

Aposporis, P., Framework for Managing Metadata Security Tags as the Basis for Making Security Decisions , Master's Thesis, Naval Postgraduate School, December 2002. 

Goktepe, M., "Windows XP Operating System Security Analysis," Master's Thesis, Naval Postgraduate School, October 2002.

Mohan, R., XML Based Adaptive IPSEC Policy Management in a Trust Management Context,  Master's Thesis, Naval Postgraduate School, September 2002. Morrison, J. D., IEEE 802.11 Wireless Local Area Network Security through Location Authentication , Master's Thesis, Naval Postgraduate School, September 2002.  Senter III, J. W., and Thornton, C. S., Information Technology (IT) Ethics: Training and Awareness Materials for the Department of the Navy,  Master's Thesis, Naval Postgraduate School, September and June 2002, respectively  Smith, K. R., "Linux, OpenBSD, and Talisker: A Comparative Complexity Analysis," Master's Thesis, Naval Postgraduate School, March 2002.  Price, P. D., "Toward an Internet Service Provider (ISP) Centric Security Approach," Master's Thesis, Naval Postgraduate School, March 2002. Vojtik, R., "Exploiting IEEE 802.11B Networks: An Electronic Warfare Approach," Master's Thesis, Naval Postgraduate School, June 2002. (Access to this thesis is restricted)

Theses 2001 Agar, C. D., "Dynamic Parameterization of IPSec," Master's Thesis, Naval Postgraduate School, December 2001. Brock, J., "Supporting the Secure Halting of User Sessions and Processes in the Linux Operating System," Master's Thesis, Naval Postgraduate School, June 2001. 

Brodhun, C. P., "Prioritization of IA Technology in a Resource Constrained Environment," Master's Thesis, Naval Postgraduate School, September 2001. (Access to this thesis is restricted)  Burns, T., "Analysis of Thread Management in Windows CE," Master's Thesis, Naval Postgraduate School, September 2001.   Glover, M., "Integrating a Trusted Computing Base Extensions Server and Secure Session Server into the Linux Operating System," Master's Thesis, Naval Postgraduate School, September 2001.  Haynes, L. D., "Implications of User Identification Devices (UIDS) for the United States," Master's Thesis, Naval Postgraduate School, September 2001. Hestad, D., "A Discretionary-Mandatory Model as Applied to Network Centric Warfare and Information Operations," Master's Thesis, Naval Postgraduate School, March 2001. 

McGovern, S., "INFOSEC Requirements for a Coalition Wide Area Network," Master's Thesis, Naval Postgraduate School, June 2001. McKinley, D. R., "Implementing the Naval Postgraduate School's Security Policy Using Windows 2000," Master's Thesis, Naval Postgraduate School, September 2001.  Negi, C., "Using Network Management Systems to Detect Distributed Denial of Service Attacks," Master's Thesis, Naval Postgraduate School, September 2001. Pedersen, C., "Trust and Its Ramifications for the DoD Public Key Infrastructure (PKI)," Master's Thesis, Naval Postgraduate School, March 2001.  Pereira, B., "Analyzing Input/Output Subsystem Security in Windows CE," Master's Thesis, Naval Postgraduate School, June 2001.  Stocks, A. "Requirements for the Deployment of Public Key Infrastructure (PKI) in the USMC Tactical Environment," Master's Thesis, Naval Postgraduate School, June 2001.  Whalen, T.,  Human Factors in Coast Guard Computer Security - An Analysis of the USCG's Current Awareness Level and Potential Techniques to Improve Security Program Viability, Master's Thesis, Naval Postgraduate School, June 2001.  Ziemba, M., A Training Framework for the Department of Defense Public Key Infrastructure, Master's Thesis, Naval Postgraduate School, September 2001. 

Theses 2000

Agacayak, C., "Analysis of Mechanisms for TCBE Control of Object Reuse in Clients," Master's Thesis, Naval Postgraduate School, March 2000.

Bartram, S., "Supporting a Trusted Path for the Linux Operating System," Master's Thesis, Naval Postgraduate School, June 2000. 

Bersack, E. L., "Implementation of a HTTP (Web) Server on a High Assurance Multilevel Secure Platform, Master's Thesis, Naval Postgraduate School, December 2000.  

Brown, E., "Implementation of an SMTP Server for a High Assurance Multilevel LAN," Master's Thesis, Naval Postgraduate School, September 2000. 

Everette, T., "Enhancement of Internet Message Access Protocol (IMAP) for User-friendly Multilevel Mail Management," Master's Thesis, Naval Postgraduate School, September 2000.  

Polk, K. V., "Transparent Detection of QOS Violations for Continuos Applications," Master's Thesis, Naval Postgraduate School, June 2000.

Roeper, F., "An Analysis of Current and Future Cryptographic Token Technology and its Applications," Master's Thesis, Naval Postgraduate School, September 2000. (Access to this thesis is restricted) 

Rossetti, R., "A Mail File Administration Tool for a Multilevel High Assurance LAN," Master's Thesis, Naval Postgraduate School, September 2000. 

Turan, B., "Analysis for A Trusted Computing Base Extension Prototype Board," Master's Thesis, Naval Postgraduate School, March 2000.

Wilson, J. D., "Trusted Networking in a Multilevel Secure Environment," Master's Thesis, Naval Postgraduate School, June 2000. 

Theses 1999 Balmer, S. "Trusted Computing Base Extension Control System For Client Workstations," Master's Thesis, Naval Postgraduate School, September 1999.   Bryer-Joyner, S. and Heller, S., "Local Area Network Services for a High Assurance Multilevel Network," Master's Thesis, Naval Postgraduate School, March 1999.  Clark, P., "A Linux-Based Support of Low-Cost Access Control Policies," Master's Thesis, Naval Postgraduate School, September 1999. Eads, B., "Developing a High Assurance Multi-level Mail Server," Master's Thesis, Naval Postgraduate School, March 1999.   Fowler, J., "Security Planning for Wireless Networks," Master's Thesis, Naval Postgraduate School, March 1999.  Hansen, A., "Public Key Infrastructure Interoperability: A Security Services Approach to Support Transfer to Trust," Master's Thesis, Naval Postgraduate School, September 1999.  Kremer H. S., "Real-Time Intrusion Detection For Windows Nt Based On Navy It -21 Audit Policy," Maste'rs Thesis, Naval Postgraduate School, September 1999.  Joyner, L., "Development of a Load-Balancing Mechanism for Parallel Firewalls," Master's Thesis, Naval Postgraduate School, March 1999. Morris, D., and Rowe, D., "PKI Roadmap for the USMC," Master's Thesis, Naval Postgraduate School, September 1999.  Oakes, D. "Migration Paths for Responding to Operating Systems Consolidation from a Network Security Perspective," Master's Thesis, Naval Postgraduate School, September 1999.   Robin, S., "Analyzing the Intel Pentium's Architecture to Support Virtual Machine Monitors," Master's Thesis, Naval Postgraduate School, September 1999. 

Theses Theses 1998 Darroca, G. G., "A Flow-Based Security Protocol for Fast IP Tag Switching," Master's Thesis, Naval Postgraduate School, September 1998   Hackerson, J., "Constructing a Trusted Computing Base Extension in Commercial-Off-the-Shelf Personal Computers for Multilevel Secure Local Area Networks," Master's Thesis, Naval Postgraduate School, September 1998   Isa, H., "Utilizing Hardware Features for Secure Thread Management," Master's Thesis, Naval Postgraduate School, December 1998 ( Abstract ,  PDF ) Macchione, W. A., "The Capabilities, Propagation Effects, and Targeting of Computer Systems," Master's Thesis, Naval Postgraduate School, March 1998 (Access to this thesis is restricted)  Wright, R., "Integrity Architecture and Security Services Demonstration for Management System for Heterogeneous Networks," Master's Thesis, Naval Postgraduate School, June 1998 

Theses 1997 Barrus, J., "Intrusion Detection in Real-Time in a Multi-Node Multi Host Environment," Master's Thesis, Naval Postgraduate School, September 1997.   Buettner, R., and Harris, R., "Comparative Analysis of Commercial Off The Shelf (COTS) Encryption Products for Use in Transmitting Sensitive But Unclassified (SBU) Data," Master's Thesis, Naval Postgraduate School, September 1997. (Access to this thesis is restricted)  Downey, J., and Robb, D., "A High Assurance Label-Based Mail Service for LANs," Master's Thesis, Naval Postgraduate School, September 1997.  English, J., "Security Analysis for a Management System for Heterogeneous Networks (MSHN)," Master's Thesis, Naval Postgraduate School, September 1997.   Umentum, B., "Using Web Technology to Disseminate INFOSEC Lectures," Master's Thesis, Naval Postgraduate School, September 1997.  Weldon, S., "Security Issues in the JMCIS-Ashore Command and Control System," Master's Thesis, Naval Postgraduate School, September 1997.

Theses 1996 Campbell, H., and Currie III, D. L., "Implementation and Efficiency of Steganographic Techniques in Bitmapped Images and Embedded Data Survivability Against Lossy Compression Schemes," Master's Thesis, Naval Postgraduate School, March 1996.  Heaton, L. A., "Radiant Mercury: An Assessment of the Issues," Master's Thesis, Naval Postgraduate School, September 1996. (Access to this thesis is restricted)  Lee, J. J., McKenna, T., "The Object-Oriented Database and Processing of Electronic Warfare Data," Master's Thesis, Naval Postgraduate School, March 1996.  Fulp, J. D., "A National Imagery System Security Policy," Master's Thesis, Naval Postgraduate School, March 1996. (Access to this thesis is restricted)  Lucas, J., "Ensuring a C2 Level of Trust and Interoperability in a Networked Windows NT Environment," Master's Thesis, Naval Postgraduate School, September 1996. Marlett, R., "Analysis of General Magic Telescript with Respect to Requirements," Master's Thesis, Naval Postgraduate School, September 1996.  Wootten, D., "A Graphic User Interface for Rapid Integration of Steganography Software," Master's Thesis, Naval Postgraduate School, March 1996.

Theses 1995 DeJong, R., "A Study of the Covert Channels in a Trusted Unix System," Master's Thesis, Naval Postgraduate School, March 1995. 

Theses 1994 Muschalek, K., "Mandatory Security Policy Enforcement in Commercial Off-the-Shelf Database Management System Software: A Comparative Analysis of Informix On-Line/Secure and Trusted ORACLE," Master's Thesis, Naval Postgraduate School, September 1994. 

Networking and Systems Administration Master of Science Degree

Close up of network rack with an attached keyboard.

Request Info about graduate study Visit Apply

Students interested in studying networking and systems administration should refer to RIT’s MS programs in cybersecurity or information technology and analytics.

Overview for Networking and Systems Administration MS

This program is no longer accepting new student applications.

Students interested in studying networking and systems administration should refer to one of the following MS programs: information technology and analytics or cybersecurity , or contact Graduate Admissions for more information.

Trends in network communications—unifying wired and wireless infrastructures, Cloud computing, scalability, collaboration tools, and security—can only be coalesced into reliable communication services if there are highly educated and technically proficient networking and systems administration professionals who understand both traditional and emerging communication technologies as well as how to apply these technologies to organizational needs and opportunities.

The explosion in ubiquitous computing today means an increased need for greater efficiency and for better management oversight in the provision of IT services. Network environments are not only becoming increasingly complex, there is a greater recognition of the power of information technology to be a strategic enabler of corporate growth and adaptation.

The MS degree in networking and systems administration provides both the knowledge and the technical skills needed to successfully compete in this environment. the program is uniquely focused to address current issues in networking and systems administration through investigation of both the theoretical and the practical aspects of this continually evolving field. Course work examines the organizational and technological issues involved in enterprise scale networking, including emerging network technologies, network processing, high performance computing, network programming, and security.

The program prepares graduates to assume leadership positions in for-profit and not-for-profit organizations dealing with evolving networking solutions or to continue their education through advanced degrees. It is available for full- and part-time study both online and on-campus.

Plan of study

The program consists of five required core courses, up to four technical electives (depending upon the capstone option chosen), and a capstone thesis or project.

Study options

This program may be completed on a full- or part-time basis, through on-campus or online learning. Full-time students may be able to complete the program in two years; part-time students may take approximately four years.

Maximum time limit

University policy requires that graduate programs be completed within seven years of the student's initial registration for courses in the program. Bridge courses are excluded.

Curriculum for 2024-2025 for Networking and Systems Administration MS

Current Students: See Curriculum Requirements

Networking and Systems Administration (thesis option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
ISTE-605 3
NSSA-602 3
NSSA-615 3
NSSA-620 3
  6
NSSA-714 3
NSSA-790 6
  3

Networking and Systems Administration (project option), MS degree, typical course sequence

Course Sem. Cr. Hrs.
ISTE-605 3
NSSA-602 3
NSSA-615 3
NSSA-620 3
  6
NSSA-714 3
NSSA-791 3
  6
Course
ISTE-721
ISTE-764
NSSA-610
NSSA-611
NSSA-612
NSSA-621
NSSA-710
NSSA-712
NSSA-713
NSSA-715
NSSA-716

* Students are required to complete at least one theoretical course. These electives fulfill this requirement.

Note for online students

The frequency of required and elective course offerings in the online program will vary, semester by semester, and will not always match the information presented here. Online students are advised to seek guidance from the listed program contact when developing their individual program course schedule.

M.Tech/Ph.D Thesis Help in Chandigarh | Thesis Guidance in Chandigarh

networking master thesis

[email protected]

networking master thesis

+91-9465330425

networking master thesis

Thesis and Research Topics in Computer Networking

Students who find programming complex and challenging mostly go for networking field in computer science engineering. But even after indulging in this field they are often confused about which topic to choose for the project or for an M.Tech thesis. Here is the list of some of the good topics in computer networking with a basic introduction which you can choose for your project or thesis. You can also get thesis help and thesis guidance on these topics from experts. In the infographic below you will find the list of latest thesis and research topics in computer networking .

List of the best thesis topics in networking:

Wireless Sensor Networks

Wireless Ad hoc Network

Vehicular Ad hoc Networks

Network Security

  • Evaluate and implement energy efficient protocol for data aggregation in wireless sensor networks
  • Node Localization Approach in underwater acoustic network using bio-inspired method
  • Evaluate and implement sink hole attack isolation method in wireless sensor networks
  • The three level hierarchical routing protocol for data aggregation in wireless sensor networks
  • Design and implement black hole attack isolation method in wireless sensor networks
  • The clock synchronization method in wireless sensor network for the efficient data transmission method
  • The efficient channel sensing scheme for wireless body area network
  • Design secure scheme for data transmission in opportunistic routing in wireless sensor networks
  • The misdirection attack isolation scheme in multilevel   hierarchical  routing protocol in WSN
  • To propose fault tolerance scheme for wireless sensor networks
  • To propose novel approach to maintain quality of service in the network for link failure
  • To propose hybrid routing protocol based on the bio-inspired methods in mobile ad hoc network
  • The threshold based mechanism for the isolation of worm hole attack in mobile ad hoc networks
  • Evaluate and implement clustering based method for the isolation of black hole attack in mobile ad hoc network
  • The novel method for the congestion avoidance in mobile ad hoc network to maintain quality of service in the network ‘
  • The multicasting scheme for the path establishment in mobile ad hoc networks
  • Implement and evaluate Sybil attack isolation scheme for vehicular ad hoc networks ‘
  • To propose novel scheme for the detection of DDOS attack in vehicular ad hoc networks
  • The zonal based routing scheme for path establishment in vehicular ad hoc networks
  • The secure and efficient message authentication scheme for vehicular ad hoc networks
  • The location based routing scheme for path establishment in vehicular ad hoc networks
  • The tree based multicasting scheme in vehicular ad hoc network for data transmission

TCP/IP Protocol

Now our systems computer, laptop, mobiles, and other internet devices are connected to one node to communicate with each other and to get internet access, and this whole process called a network system. They all are connected with the physical medium so that’s why they can be guided as wireless network system or copper wire network system to provide calculated data speed in the notes time frame. It spreads motions as electromagnetic waves or light pulses. The direct connection between two nodes are considered as guided medium and is more reliable and the occurrence of error has very less as compared to another medium. Un-guided medium is used in so many systems to provide multiple outputs at the same time. But in this system error rate is high.

To send or receive the internet signal, the two nodes follow a set of protocol which is known as IP (internet protocol). Each system is designed to follow this set of rules itself to generate maximum speed with a time limit. These protocols are designed in a manner that they follow these rules one by one. Each layer follows the protocol of the upper layer to provide services and then that layer follows the upper layer, this process will continue until data is transmitted or received. Lower layer always follows the basic set of rules and upper layer follows the advanced set of rules. Service provided by both layer will be different in terms of protocol instructions.

First data is sent or received in the application layer and then in the transport layer, after following the set of rules data then is sent to network layer to link layer and after that data has been sent to physical layer to the user. Data is divided into small packet format to provide consistency. Common internet protocol is RTP (Real-time Transport Protocol). which is used to provide information at the time of gaming, movie or music streaming. first two-layer are used to transmit or receive the information in small data packets.

Two main internet protocols are UDP (user datagram protocol) and TCP (transport control protocol). UDP and TCP both have their advantages and disadvantages of use. UDP is used because of their simplicity and with the use of UDP data can be sent immediately. But at the same time, it is unreliable as compared to TCP. TCP, then again, directs the sending rate concerning the client’s ability – stream control – and with respect to the limit of the system – clog control. It conveys the information altogether and guarantees that all information achieve the beneficiary. The hidden layers, similar to the system layer, are not required to perform solid conveyance.

TCP(Transmission Control Protocol) is a set of rules to access the Internet with the interconnection of various Internet-based devices. We can say it is a communication protocol in which there is a host with access to the Internet. This is a good topic for an M.Tech thesis in networking. If you are planning to choose this networking topic for research, then here is some basic introduction to this.

TCP/IP provides end to end data transmission between devices along with some other functionalities like addressing, mapping and acknowledgment. TCP/IP is a combination of two protocols. TCP controls the messages by dividing them into packets. IP controls the transmission of these packets from the sender to the receiver.

TCP/IP protocol layers

Following are the four layers of TCP/IP:

Application layer

Transport layer

Internet layer

Physical layer

Working of TCP/IP protocol

Client/Server model is used as a mode of communication by TCP/IP. It works in the following way:

Application layer consists of various applications for data exchange with use of protocols like HTTP(Hypertext Transfer Protocol), FTP(File Transfer Protocol), SMTP(Simple Mail Transfer Protocol)

The transport layer provides end-to-end communication between the host and the user. It uses protocol UDP(User Datagram Protocol).

Internet layer is responsible for the transfer of packets over the network and uses IP(Internet Protocol) for this purpose.

The physical layer provides interconnection between the nodes.

Advantages of TCP/IP protocol

It can be easily modified.

It is compatible with all the operating systems.

It is scalable in determining the most appropriate path.

Thus it is a good topic for M.Tech thesis as well as for research. A student can get thesis help on this topic from experts specialized in thesis guidance. You can also explore the Internet for further details on this topic.

Network Simulation Tools

Here is the list of commonly used network simulators having different features:

Another good computer networking topic for an M.Tech thesis is NS2 . NS stands for Network Simulator. It is an open-source, discrete-event based network simulator mainly used for research purpose and for teaching. It provides help in simulating routing protocols like IP, TCP, UDP, etc. It creates a simulation environment for studying the network. Following steps are followed while creating a simulation environment:

Topology Definition

Development of the model

The configuration of the link

Analysis of the problem

Visualization

NS2 create network topologies and then examines the behavior of the network under any event. The behavior is analyzed by tracing down the events. NS2 provides text-based as well as animation-based simulations.

Advantages of NS2

It has the ability to support multiple protocols.

It can represent network traffic graphically.

It can also support multiple algorithms for routing and queuing.

NS2 is a very good topic for an M.Tech thesis in the computer networking field. You will not only get theoretical knowledge but also practical experience of network simulator tool. You can get thesis guidance about NS2 from an expert who has practical knowledge about how to use this tool.

MANET stands for mobile ad hoc Network and is another good choice for an M.Tech thesis topic in networking. In MANET, the nodes are self-configurable and have the ability to move freely in any direction and can link with other devices frequently. MANET was originally used as a military project in defense. MANET have the challenges of weak signal strength, reliability, power consumption along with some other problems.

Characteristics of MANET

Each node is independent in nature i.e. each node act as the host as well as the router.

It is based on the distributed nature of operation for security and configuration.

The network is dynamic in nature i.e each node can join and exit the network at any time.

The nodes in the network are associated with less memory and power.

In MANET, the bandwidth remains fluctuating.

MANET creates a symmetric environment such that all the nodes have identical features like responsibilities and capabilities.

Hurdles in the path of MANET

There are certain hurdles in the path of MANET, which it has to overcome. Some of these are:

The reliability of the transmission is affected by certain factors like data loss, interference, and blockage.

The rate of transmission is limited to a certain range thus there is a reduced data rate.

Packet loss can occur while transmission of data.

Frequent path breaks.

Lack of firewall results in security issues in the network.

This was just the introduction to MANET to give an overview of what it is if you are going with this topic for your M.Tech thesis.

Network Security is the set of rules to ensure the safety of the network of an organization or personal network. You can choose this topic for your M.Tech thesis if you have a complete understanding of how the data is transferred over the network. Network Security also include security of physical hardware devices. Network Security in software means providing authorized access to the network by means of ids and passwords.

Whenever a user tries to access the network, his authenticity is checked by means of ids and passwords. This is done to prevent any malicious user from entering the network by the motive of hacking it.

Types of attacks to network

Active Attack – In this type of attack, a hacker tries to make changes to data while it is being sent from one node to another.

Passive Attack – In this type of attack, an outsider monitors system of the organization consistently to find vulnerable ports.

Network Security Tools

Following are some of the tools employed in network security:

Thus if you really have significant knowledge(practical + theoretical) of networking tools, security

measures then you should choose this topic for M.Tech thesis. Besides, you will get thesis help as well as guidance on this topic from computer networking experts.

Network Topologies

Network Topology is the arrangement of nodes in the network both physical and logical. It is an easy topic for M.Tech thesis. Following are some of the common physical topologies:

Bus – In the bus topology, each node is connected to the main cable known as bus such that every node is directly connected to every other node.

Star – In the star topology, each node is connected to a central hub such that all the nodes are indirectly connected to each other.

Ring – In this topology, the nodes form a closed loop such that the adjacent nodes are in direct connection with each other.

Token Ring – In the token ring topology, a protocol is used. A token is passed from one node to another. A node that wants to transfer data should acquire the token.

Mesh – In the mesh network, each node is directly connected to every other node. It can be a full mesh or partial mesh network.

Tree – It is the interconnection of bus topology and star topology.

Daisy Chain – In this topology, each node is connected to two other nodes but do not form a closed loop like ring topology.

Hybrid – It is a combination of two or more topologies.

If you are afraid of complex topics in networking for M.Tech thesis, then this topic is for. It is relatively simple to understand and work on. Just go for it.

It is another major topic in computer networking and also a good choice for a thesis or project. Ipv4 is the fourth version of Internet protocol while Ipv6 is the sixth version of Internet protocol.

Characteristics of IPv4

It uses a 32-bit address.

The address is written in decimal separated by dots.

The header includes a checksum.

Broadcast addresses are used to send data packets to other nodes.

In this the Internet Protocol Security is optional.

Characteristics of Ipv6

It uses a 128-bit address.

The address is written in hexadecimal separated by colons.

The header does not include a checksum.

Broadcast addresses are not used to send data packets.

The Internet Security Protocol is compulsory.

It is a good area to study how data transfer takes place over the internet. You will study the IP data packets of Ipv4 and Ipv6. You can select this as your M.Tech thesis topic.

OSI stands for open system interconnection. It is another good topic for an M.Tech thesis in the computer networking field. It provides a networking framework to implement protocols in layers. There are seven layers of OSI Model:

Physical Layer – This layer is responsible for transferring digital data from the source to the destination.

Data Link Layer – This layer checks error in data along with the MAC address. It turns bits into data frames.

Network Layer – This layer checks whether the data has reached the destination or not by examining the source and the destination address.

Transport Layer – This layer transfers data over the network by using the TCP protocol.

Session Layer – This layer manages the events and keeps them in sequence. It supports multiple types of connections.

Presentation Layer – It looks after the syntax along with encryption and decryption for the application layer above it.

Application Layer – It provides end-to-end user applications using protocols like HTTP, FTP, SMTP.

networking master thesis

It is different from the TCP/IP model. You will get a thesis guide on this topic from computer networking experts.

However, with the change of social economy, computer networking system changes a lot and have also changed people’s lifestyle in a lot of aspects. As we know with the increasing demand for network speed, a number of network provider has been also increased. Due to the maximum number of the provider, one can easily access the high speed of the internet at a low cost. Local area network which is used in lots more other sectors like medical, military, education and science. Now we can see every-one need their own personal LAN (Local Area Network). Now LAN is not only for big enterprises but it is also available for small schools and families which are looking for high speed of data in the minimum amount.

The current speed of LAN is not enough for a user so that’s why companies are doing more research and study to provide the data at higher speed without the use of high bandwidth. But as we know if we want higher speed in a short time with a wide area, bandwidth will be increased to 30% to 300%. Now one of the very well known company called Huawei launched its 5G network, which is faster than the USA 5G network. So with this network Bandwidth also increased by 300%. It is beneficial for us but at the same time, a higher bandwidth is also not good for human life.

Various exploratory and early business LAN innovations were created during the 1970s. But then a new term called WLAN is introduced to the world in 1997 to provide a wireless network. This technology got famous in a very short span of time with the name of WiFi (Wireless Fidelity).

It stands for Wireless Local Area Network. It can be another good choice for an M.Tech thesis topic in computer networking. It is a wireless distribution method that uses high-frequency radio waves with a single access point to the Internet. In other words, it is wireless communication between two or more devices such that users can move around in a limited range area. It is most commonly used in homes or offices. The component connected to WLAN is referred to as the station. There are two types of stations – Access Point, Client.

Access Points are the base stations that transmit and receive radio frequencies for wireless-enabled devices. Clients are mobile phones, laptops, desktops connected to the wireless network.

Modes of Operation of WLAN

There are two modes of operation of WLAN:

Infrastructure – In infrastructure mode, base station act as the access point and all the nodes communicate through this point.

Ad hoc – In Ad hoc mode, mobile devices transmit data directly using peer to peer method. In this, there is no base station.

WLAN Advantages

It can support a large number of devices.

It is easy to set up wireless LAN than installing cables for the wired network.

It is easier to access a wireless network than a wired network.

WLAN Disadvantages

It is difficult to expand the network.

It faces security issues like hacking.

Interference is another problem with WLAN.

WLAN is another easier topic for an M.Tech thesis. It is used everywhere. You can take thesis help on this topic from networking professionals.

Cryptography

It is the science of maintaining the privacy of data. It is also an easy topic to choose for your M.Tech thesis in networking. There are three main objectives of cryptography used in transferring data over the network:

Confidentiality

Authentication

networking master thesis

Cryptography employs two techniques for maintaining the privacy of data:

Encryption – In encryption, the plain text is converted into some other form known as ciphertext.

Decryption – In this technique, the converted text i.e the ciphertext is translated back to the original text.

There are two algorithms for cryptography. In a symmetric key, both the sender and the receiver share the same key for encryption and decryption.

In an asymmetric key, both the users have different keys respectively for encryption and decryption.

This is a familiar topic and very easy to understand. Take the guidance of a thesis expert about this area to start with this topic.

IEEE stands for Institute of Electrical and Electronics Engineers. IEEE 802 is a very challenging and a very good topic for your thesis. IEEE 802 comes under IEEE and deal with LAN(Local Area Network) and MAN(Metropolitan Area Network). It specifies certain services and protocols for the data link layer and physical layer of the OSI model. IEEE is further subdivided into 22 parts that cover a wide range of services.

IEEE 802 subdivides data link layer into two layers namely: Logical Link Layer(LLC)

Media Access Control(MAC)

You can choose any of its subfields as a part of your project or thesis. It is a very good area to explore.

These were some of the few topics for an M.Tech thesis in computer networking. You can also choose any one of these for research in networking or for your project. You can explore more on these topics.

If you need help with thesis topics in computer networking, you can contact us . You can call us on this number +91-9465330425 or email us at [email protected] for M.Tech and Ph.D. thesis help in computer networking. You can also fill the query form on the website.

For more details Contact Us.  You can call us on this number +91-9465330425 or drop an email at   [email protected]   for any type of dissertation help in India. You can also fill the query form on the website. 

You can also visit our website Techsparks and follow us on Pinterest , Facebook , Twitter, YouTube and Linkedin for latest thesis blog.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Save my name, email, and website in this browser for the next time I comment.

Quick Enquiry

Get a quote, share your details to get free.

The Networked Digital Library of Theses and Dissertations (NDLTD) is an international organization dedicated to promoting the adoption, creation, use, dissemination, and preservation of electronic theses and dissertations (ETDs). We support electronic publishing and open access to scholarship in order to enhance the sharing of knowledge worldwide.

Etd 2024 call for proposals extended.

In response to numerous request, the paper/poster abstract and workshop proposal submission deadline for the ETD 2024 symposium has been extended to May 17 2024. It is hoped that this will give additional potential authors enough time to submit their work.

The Call for Papers for ETD2024 is now open!

27th International Symposium on Electronic Theses and Dissertations *Electronic Thesis and Dissertation Visibility at a Global Scale* /Join us, along with global leaders, from Wednesday, October 30th to Friday, November 1st, in Livingstone, Zambia./ The theme for ETD 2024 is “Electronic Thesis …

ETD 2024 Announcement

We are thrilled to announce that the 27th International Symposium on Electronic #Theses and #Dissertations (#ETD2024) will take place on October 30th to November 1st in Livingstone, Zambia. Hosted by The University Of Zambia (UNZA), Higher Education Authority of Zambia and Zambia Research and Education Network together with …

We are thrilled to announce that the 27th International Symposium on Electronic #Theses and #Dissertations (#ETD2024) will take place on October 30th to November 1st in Livingstone, Zambia.  Hosted by The University Of Zambia (UNZA), Higher Education Authority of Zambia and Zambia Research and Education Network together with NDLTD.  …

USETDA 2024 Conference September 25-27, 2024 in Provo, Utah

  The USETDA 2024 Conference will be held September 25-27, 2024 as a hybrid event in Provo, Utah on the campus of Brigham Young University and the Provo Marriott Hotel. For details visit https://www.usetda.org/usetda-conferences/usetda-2024/. Call for proposals. Important Dates Call for proposals …

Subscribe to our newsletter

Join our community and get the latest news on NDLTD events and resources

networking master thesis

MS Network Projects

MS Network Projects encompasses all networks with the out of the box ideas. The network is the pool of nodes or devices that have a connection in any way, such as Fiber Optics, Wireless, or Wired. In fact, the aim of any network is to collect the data from one place and transmit it to another place through these links. In common, it is the broad domain that has untold areas and sub-fields to explore. 

LATEST IMPACTFUL AREAS FOR MS NETWORK PROJECTS 

  • Internet of Vehicles
  • Internet of Things
  • Industrial Internet of Things
  • Wireless and Optical Sensor Network
  • Underwater Acoustic Sensor Network
  • Cognitive Radio Ad-hoc Network
  • HetNets and Small-cell Networks in 5G
  • Coexistence of WiMAX in LTE Networks
  • D2D, M2M, and MTC Over Wireless Networks

   Apart from this, Hybrid Networking areas are also there to start. For a case, Named Data VANET that is ND-VANET, is in progress that has many merits over the conventional. On the one hand, area selection from Networking is tricky due to its wide nature. On the other hand, topic selection is even trickier as it covers many ideas. Herein, we sorted novel concepts to begin your MS Network Projects . 

TAKE A RAPID LOOK OVER NOVEL NETWORKING CONCEPTS

In network topology .

  • Dynamic Topology Discovery under 3D-WSN
  • Multi-Plane and Multi-Controller SDN Design
  • Multi-Level Dragonfly Topology for 3D-NoCs
  • Network Slice Topology Learning over Virtualized 5G
  • Topology and Traffic Prediction for V2X

In NETWORK ROUTING

  • Multi-Objective Multi-Path Routing for Multimedia Streaming 
  • AI-assisted Route Selection with En-Route Filtering
  • End-to-End QoS based Routing over Ad-hoc Networks
  • Joint Antenna Selection and Routing in MIMO-5G
  • Spectrum and Mobility aware Route Selection over CRN

In NETWORK RESOURCE MANAGEMENT

  • Adaptive Threshold for Power and Resource Allocation
  • Machine Learning for Resource Provisioning in Femtocells
  • Inter-cell Interference Cancellation and Management in 5G-WSN
  • Resource Block Scheduling in LTE-VANET for D2D Communication 
  • Zero-Rated QoE aware Resource Management in Cloud-RAN

In NETWORK SECURITY

  • Lightweight Cryptography for E2E Secure Data Sharing
  • Blockchain for Network Forensics by Customized Smart Contracts
  • Deep Learning for Intrusion Prevention and Detection
  • Multi-Factor Network Access Control by Biometrics 
  • Distributed Key Management with Firewall Verification

Everything you need to know to carry your research MS Network Projects

   In the above, we talk over novel concepts pointing out the core network processes that have a high impact nowadays. To add a point, MAC Scheduling, Data Aggregation, and so on are also the best to start a network project. As well, to realize any idea, one must have well-versed wisdom in the networking protocols and its functions. In addition, Networking is the base for all growing fields. That is to say, MS scholar guidance in Network Projects will raise your grades by adding real-time prototypes.

   Anyhow, the decision is yours, as we never interfere with that. We always rely on your opinions and desires not only in concept derivation but also in implementation. Get some ideas on how to execute the networking concepts from below. 

HOW CAN DEVELOP THE IDEAS?

   Once you have done almost the concept, and then you must validate it. In the career of MS students, simulation is as much as important. To do so, we make avail of a number of network simulation tools. We also bring it together for your notice.

  • OMNeT++ and Matlab 
  • OPNET and QualNet
  • NS-2, NS3, and also GNS3
  • NetSim and LTESim
  • Mininet and also Cooja

   Each tool demands facts in diverse coding languages as well as IDEs. To make it clear, for each tool, you must gain insights on Modules, Libraries, Languages, and so on. Of course, it is not easy to do. That’s why we aid MS students in online training to practice the intended tool.

   The all above detail is only for your note. We have an A-to-Z guide to help all MS students worldwide. Join us before or after starting your project. At any stage, we will uplift your feats. So, leave your fears and start your feats with us.

Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Network Assistance

Named Data Networking Projects

Assignment Help

Netsim Projects

Phd Guidance

Network Attack Projects

Network Guidance

Network Communication Projects

Network Ms Guidance

Network Projects

Network Phd Guidance

Ms Guidance

Network Research Projects

Network Security Projects

Network Routing Algorithms Projects

networking master thesis

YouTube Channel

Unlimited Network Simulation Results available here.

Network Projects for Master Thesis Students

              Network Projects for Master Thesis Students endeavors great potential research projects and theses for master and PhD students. Our world-class certified engineers carry students to enhance their research work in an innovative way. By approaching various kinds of efforts in networking, we develop the most effective projects. Most often, students started their research work on networking areas to explore various approaches in design. By the end of project completion, students need to prepare a thesis to complete their graduation.

We have provided 2000+ thesis for students from 120+ countries, and our knowledge is versatile to handle students in innovative ways. We offer advanced topics and also recent research areas for students to design projects in networking.  Now, this is the time to select a topic. If you don’t have any idea to select which topic will also be suitable for current trends, we guide you to select the best topic. Approach us also for the selection of topics……….

Network Projects for Master Thesis Students Online

Projects for Master Thesis Students

            Network Projects for Master Thesis Students offers broad range of research ideas and topics for students to prepare their thesis in networking. To take up a networking project, you need to have a top expert’s guidance who has strong knowledge in both practical and theoretical experiments. Today, there’s a lot of research on networking like M2M, IoT, cybersecurity/network security, cloud systems, application, and networks

Over the past ten decades, many of our technical team members are research active in science, engineering, and computing technologies. This ensures our standard and also experience in network projects. We also have provided a few about networking for students to get an idea about network projects.

Next Generation of Networking Areas

  • Hype over 5G
  • Ambient Backscatter
  • Multi-band Routers Rise
  • 4D Networks
  • 100% uptime and also sub-millisecond transfer rates

Networking in Wireless Networks

  • Privacy and also Security in wireless network virtualization
  • Virtual Test Labs and also Network federation
  • Optimal utilization of network and also communication resource by virtualization
  • Advanced algorithms and protocols also for dynamic network virtualization
  • Network virtualization technologies also for 5G wireless networks

Networking in 4D Networks

  • Security vulnerabilities
  • Stability features
  • Overcome stability problems

Networking in Cloud Computing

  • Virtual test labs and also in network federation
  • Segmented usage and adoption
  • Cost containment and management
  • DaaS: Security Risks of an Emerging Cloud Service model
  • Network Function Virtualization and also Mobile Cloud computing

Networking in 5G Networks

  • Massive MIMO and also 3D MIMO
  • Advanced Indoor Positioning System
  • M2M Massive Access Technologies
  • Cloud-RAN reduces energy consumption

Networking in Internet

  • Green Internet
  • DNS and Content Replication
  • Ubiquitous Computing systems
  • Future Internet Federation and also Virtualization
  • Networked systems
  • Vehicular communications
  • Embedded Systems

Interfacing in Networks

  • TraNS Simulator is interface also with SUMO and NS2 for traffic network simulation
  • Mininet interface also with NS3
  • BRITE interface also with NS3
  • Web interface also with NS2

Development Tool’s and Software’s

  • OpenStack all-in-one
  • And also in Graphical Network simulator

Purpose of Tools and Software’s

Openstack all-in-one:, graphical network simulator:, major research areas.

  • Optical wireless networks
  • Network management and also measurement
  • Network visualization and also security
  • 5G and LTE-C Networks
  • Cognitive Radio Networking
  • Internet topology mapping applications
  • Big data Networking
  • Cyber Forensics
  • Software Defined Networking
  • Dynamic Spectrum Access and also Security
  • Online Social Networking Appliances also based on Cloud
  • Heterogeneous Networking

Research Topics in Networking

  • Simulation of Network protocol behavior analysis
  • Defense applications (UHF, HF, VFH MANET, and also tactical data links)
  • Working with 5G networks and CRN
  • Modification of existing network impact assessment
  • Data centers design validation, enterprise and also sensor networks
  • QoS improvement and also network life time etc.
  • Offloading in HetNets
  • IEEE 802.11ah based networks also for energy consumption
  • Privacy preserving crowd sensing
  • Protecting spectrum access systems also for sensor networks
  • Large scale, high density persistent and also energy efficient wireless monitoring
  • Geo-based content sharing
  • Interference avoidance in 802.11
  • Multi-bitrate video caching also in mobile edge computing networks

      We also hope that this is slightly curious for students who are doing projects of a master thesis in networking. If you also need to refine your thesis strategy, contact our top thesis writers to reflect on what you have required. Consult our organization also for further relevant information

Timely joint with us,

We share our knowledge across world in all disciplines and involving students is,  the key to successful research……………, related pages.

  • Research Topics in Network Security for PhD
  • Wireless Sensor Networks Projects Topics
  • Latest Research Topics in Network Security
  • Current Research Topics in Network Security
  • Visual Cryptography Projects
  • Cryptography Based Projects
  • Thesis on MANET Projects
  • UMTS Network Simulation Projects
  • Sensor Networks Projects
  • Wireless Sensor Networks Applications Projects
  • Wireless Sensor Networks Thesis Topics
  • Machine to Machine Communication Projects
  • Controller Area Network Projects
  • PhD Thesis on Wireless Sensor Network
  • Networking Thesis Topics for Computer Science
  • Network Security Project Ideas
  • Networking Projects for Students
  • Network Simulation Tools Projects
  • Thesis on MANET Routing Protocols
  • Communication Networks Thesis Topics
  • Network Security PhD Research Topics
  • Network Security Thesis Topics
  • Latest Research Topics in Computer Networks
  • Master Thesis in Network Simulation

Trending Topics

  • Columbia president steps down

Get JTA's Daily Briefing in your inbox

I accept the JTA Privacy Policy .

By submitting the above I agree to the privacy policy and terms of use of JTA.org

Tim Walz wrote a master’s thesis on Holocaust education, just as his own school’s approach drew criticism

A politician stands and applauds an elderly woman at a gala dinner

In Judi Agustin’s freshman year at Mankato West High School, her teacher instructed her to wear a yellow star.

It was part of a Holocaust curriculum at the school, located in a remote area of Minnesota with barely any Jews. For a week, freshmen were asked to wear the yellow stars, which were reminiscent of the ones the Nazis made the Jews wear. Seniors played the part of the Gestapo, charged with persecuting the “Jews.”

Unlike everyone else in her class in the 2001-2002 school year, Agustin was Jewish. The experience “was incredibly hurtful and offensive and scary,” she recalled on Tuesday. Her father complained to the district, and wrote a letter to the local paper decrying the lesson.

In response, she recalled, a teacher intervened. That teacher, according to her recollection: current vice presidential nominee Tim Walz.

“When Tim Walz found out about it, he squashed it real quick, and as far as I understand they never did it again,” Agustin told the Jewish Telegraphic Agency. “So he was an advocate for my experience, as one of four Jewish kids in the entire school district. And I always felt like he had our back.”

A progressive favorite in Minnesota, where he is now governor, Walz is also heralded for his background as a public school educator. Lesser known is the fact that, while teaching in rural, largely white Midwestern school districts, Walz developed a particular interest in Holocaust and genocide education.

Walz is on the campaign trail this week with Vice President Kamala Harris, his running mate, and did not immediately respond to a request for comment. JTA could not independently verify that he was the teacher who stopped the Mankato West lesson.

But it’s clear that how to teach the Holocaust well has occupied Walz for decades. In 1993, while teaching in Nebraska, he was part of an inaugural conference of U.S. educators convened by the soon-to-open U.S. Holocaust Memorial Museum in Washington, D.C. Eight years later, after moving to Minnesota, he wrote a thesis arguing for changes in Holocaust education. And as governor, he backed a push to mandate teaching about the Holocaust in Minnesota schools.

Through it all, Walz modeled and argued for careful instruction that treated the Holocaust as one of multiple genocides worth understanding.

“Schools are teaching about the Jewish Holocaust, but the way it is traditionally being taught is not leading to increased knowledge of the causes of genocide in all parts of the world,” Walz wrote in his thesis, submitted in 2001.

The thesis was the culmination of Walz’s master’s degree focused on Holocaust and genocide education at Minnesota State University, Mankato, which he earned while teaching at Mankato West. His 27-page thesis, which JTA obtained, is titled “Improving Human Rights and Genocide Studies in the American High School Classroom.”

In it, Walz argues that the lessons of the “Jewish Holocaust” should be taught “in the greater context of human rights abuses,” rather than as a unique historical anomaly or as part of a larger unit on World War II. “To exclude other acts of genocide severely limited students’ ability to synthesize the lessons of the Holocaust and the ability to apply them elsewhere,” he wrote.

He then took a position that he noted was “controversial” among Holocaust scholars: that the Holocaust should not be taught as unique, but used to help students identify “clear patterns” with other historical genocides like the Armenian and Rwandan genocides.

Walz was describing, in effect, his own approach to teaching the Holocaust that he implemented in Alliance, Nebraska, years earlier. In the state’s remote northwest region, Walz asked his global geography class to study the common factors that linked the Holocaust to other historical genocides , including economic strife, totalitarian ideology and colonialism. The year was 1993. At year’s end, Walz and his class correctly predicted that Rwanda was most at risk of sliding into genocide.

“The Holocaust is taught too often purely as a historical event, an anomaly, a moment in time,” Walz Told the New York Times in 2008, reflecting on those Alliance lessons. “That relieves us of responsibility. Obviously, the mastermind was sociopathic, but on the scale for it to happen, there had to be a lot of people in the country who chose to go down that path.”

In his thesis, he noted that he intended to bring this curriculum to the Mankato school district as a “sample unit.” But another kind of lesson was unfolding there at the same time.

For years at Mankato West, high school students had been engaged in a peculiar lesson that was, all the same, not unusual for its time: In an effort to teach students who had never met a Jewish person what it might have been like to live under the Nazis, teachers had them role play.

For a week, freshmen wore the yellow stars, and seniors playing the Gestapo were given permission to torment them.

Such lessons had been going on since at least the 1990s, recalled Leah Solo, a Jewish student who graduated from Mankato West in 1998. For Solo, these lessons weren’t so bad.

“People knew I was Jewish, people knew to be sensitive around me,” Solo told JTA. Her teacher, who was not Walz and whom she liked, “was doing his best to try to teach a really hard subject to folks who had no idea. Most of these kids had never met a Jew before.” In her senior year she was given the choice of whether she wanted to play a Nazi or another kind of role, and chose the latter.

Things were different by the time Agustin took the class several years later. By then, the Holocaust role-playing wasn’t just limited to the confines of the classroom.

“They could come up to you in the lunchroom,” recalled Anne Heintz, a fellow student at the time. Local students whispered about the lesson before they got to high school, she said.

One senior, in Agustin’s recollection, got violent and started shoving the “Jewish” freshmen into lockers.

Outraged, her father wrote a letter to the local newspaper, and some parents complained to the school district. Agustin left the high school after her sophomore year. None of this happened in Walz’s classroom, according to the students, and Heintz recalled that the lessons had ended by the time she graduated in 2004.

“I’m not sure what his involvement was. I know it just ended,” Heintz, who is not Jewish, told JTA. “He was teaching at the time it ended.”

JTA could not verify whether Walz knew about the lessons, which had been going on for years, before they were stopped. A spokesperson for the high school told JTA they “don’t have any information” on the details of the lessons, but noted, “When Governor Walz was at Mankato West High School he was primarily a Global Geography Teacher and Football Coach. Subjects such as the Holocaust were taught in history courses.”

Agustin’s father, Stewart Ross, told JTA that he did not recall Walz being involved. Neither did Bob Ihrig, one of the teachers who taught the lesson as part of a World War II unit. He said it continued in a limited, classroom-only version until his retirement in 2014.

Ross, Ihrig and all three Mankato West High students spoke highly of Walz as a teacher and community leader, though only one, Heintz, actually had him in the classroom.

“What I remember most is, he always made all the subjects that we talked about super engaging,” she said. “It always seemed like he was able to make a subject really exciting for folks and really engage everyone in class. And I think that is part of how he speaks now that he’s on a national stage as well.”

Solo, who had Walz’s wife Gwen for a different class, took a student trip led by the couple to China, where Tim Walz taught for a year early in his career. She recalled how, in 2004, Walz stood up for her when she was working with John Kerry’s presidential campaign and security for a George W. Bush rally tried to boot them from the premises.

“When security also tried to kick him out, he was like, ‘I am a former Teacher of the Year who just returned from being deployed. I don’t think you want to kick me out,’” Solo recalled, describing an incident that made local news at the time. “And then after the rally, he came and signed up to volunteer with the Kerry campaign, because he did not appreciate that.”

Volunteering with Kerry’s campaign led directly to Walz’s entrance into politics . Solo would go on to work for Walz’s congressional campaigns.

Walz stuck with teaching as he began his political career; when he was elected to represent Mankato in 2006, he was the only active educator in Congress.

Last year, as Minnesota’s governor, Walz returned to Holocaust education, and supported and signed a law requiring the state’s middle and high schools to teach about the Holocaust. The law, initiated and championed by the Jewish Community Relations Council of Minnesota and the Dakotas, also encourages schools to teach about other genocides. A working group for the curriculum hit snags earlier this summer when a pro-Palestinian activist was removed from the committee amid debates on whether Israel’s conduct in Gaza constitutes genocide.

The mandate is still anticipated to go into effect in the 2025-2026 school year. “This is going to work out, this is going to be good, because the governor and his staff are highly attuned to the concerns and sensitivities of the Jewish community,” Ethan Roberts, the JCRC’s deputy executive director, told JTA.

Speaking at a JCRC event in June, Walz said he had been “privileged and proud” to have participated in the U.S. Holocaust Memorial Museum training early in his career. But he said more needed to be done, and he emphasized that the curriculum chosen to accomplish the requirement would determine its success.

“We need to do better on Holocaust education. We need to do better on ethnic studies,” he told the crowd. “And I tell you this as a teacher and as governor, too, we don’t need test scores or anything to tell us that we’re failing.”

It was the kind of message that former Mankato West students said they came to expect from him.

“He is what you hope a great teacher is,” said Solo, “which is someone who’s not only teaching, but also learning at all times.”

With additional reporting by Jackie Hajdenberg. 

Correction and updates (Aug. 8): This story has been corrected to remove a reference to Tim Walz as department chair. It has also been updated to reflect additional sources about Holocaust instruction at Mankato West High School.

Share this:

Recommended from jta.

Kamala Harris Democratic National Convention

Israel, Gaza and Josh Shapiro: What we’re watching for during the Democratic National Convention

networking master thesis

Barbra Streisand, Susie Essman and 30,000 others join ‘Jewish women for Kamala’ call

networking master thesis

Pittsburgh Jewish groups hope to quash a referendum that would force the city to boycott Israel

networking master thesis

In speech about antisemitism, Trump blames Harris and focuses on anti-Israel forces

Rabbi Angela Buchdahl

Nearly 100 US rabbis and cantors urge Netanyahu to finalize deal to free remaining hostages

networking master thesis

Tel Aviv’s ‘Hostage Square’ is coming to Chicago for the DNC — whether or not a pro-Israel march gets a permit

networking master thesis

  • Cast & crew
  • User reviews

My Hero Academia: You're Next

My Hero Academia: You're Next (2024)

Izuku Midoriya, a U.A. High School student who aspires to be the best hero he can be, confronts the villain who imitates the hero he once admired. Izuku Midoriya, a U.A. High School student who aspires to be the best hero he can be, confronts the villain who imitates the hero he once admired. Izuku Midoriya, a U.A. High School student who aspires to be the best hero he can be, confronts the villain who imitates the hero he once admired.

  • Tensai Okamura
  • Yôsuke Kuroda
  • Kôhei Horikoshi
  • Kaito Ishikawa
  • Kenta Miyake
  • 1 User review

Daiki Yamashita in My Hero Academia: You're Next (2024)

  • Shoto Todoroki

Kenta Miyake

  • Giulio Gandini
  • Anna Scervino
  • Katsuki Bakugo

Ayane Sakura

  • Ochaco Uraraka
  • Izuku Midoriya
  • All cast & crew
  • Production, box office & more at IMDbPro

More like this

My Hero Academia: World Heroes' Mission

Did you know

  • Trivia This will be the final My Hero Academia movie, as the manga will end just after the film's release.
  • Connections Spin-off from My Hero Academia (2016)

User reviews 1

  • October 11, 2024 (United States)
  • Official website
  • 我的英雄學院劇場版:You're Next
  • See more company credits at IMDbPro
  • $11,235,409

Technical specs

  • Runtime 1 hour 50 minutes

Related news

Contribute to this page.

My Hero Academia: You're Next (2024)

  • See more gaps
  • Learn more about contributing

More to explore

Recently viewed.

networking master thesis

IMAGES

  1. Network Tools for Master Thesis (Research Assistance)

    networking master thesis

  2. Empirical Research Study of Network Thesis Guidance Worldwide

    networking master thesis

  3. Networking Thesis Topics for Computer Science (Help)

    networking master thesis

  4. Research Networking Projects for Masters [Thesis Writing Service]

    networking master thesis

  5. Research Networking Projects for Masters [Thesis Writing Service]

    networking master thesis

  6. Best M Tech Thesis Topics in Networking

    networking master thesis

COMMENTS

  1. PDF The Power of Networking

    The Power of Networking. A research on the influence of third actors on establishing and developing business relationships of a technology oriented start‐up. Master thesis MSc. Business Administration. Inou Heideman. 25 February 2018. Faculty of Behavioural, Management & Social Sciences.

  2. Computer Networking Dissertation Topics

    Whether you are pursuing your master's or are enrolled in a PhD program, you will not be awarded a degree without successfully submitting a thesis. ... With the field evolving with each passing day, you must ensure that your thesis covers recent computer networking topics and explores a relevant problem or issue. To help you choose the right ...

  3. Design and Implementation of a Network Service Marketplace

    In this thesis, the research focuses on service-based network with choice. \Design for choice" is a key principle for future Internet [4]. We believe that ChoiceNet (service-based network with choice) is the most suitable option for future Internet since it can not only drive innovations of current Internet but also take economy

  4. Student Thesis

    In this master thesis a realisation of a DT into the P4 switches will be tested. First a functioning DT based on a real data traffic dataset will be implemented. Both variations (per-packet/per-flow) will be taken into consideration. The second step will be to translate the algorithm into the P4 switches.

  5. PDF Wireless Local Area Networking For Device Monitoring

    the University of Rochester in the 3-2 Master's program in Electrical and Computer Engineering, concentrating on communications. With the guidance of Professor Wendi ... In this thesis, a wireless local area networking technique is developed, which is intended for use in a device monitoring system. A full review of the current wireless local

  6. PDF Network security in Zero Trust

    networks and services as well. This thesis focuses on how zero touch concepts will affect enterprise networking and what is the impact for the traditional network security perimeter and security enforcement points. 1 Purpose, Objectives and Research Questions Purpose of the thesis is to describe Zero Trust concept and investigate its influence in

  7. MASTER THESIS ADMINISTRATION OF REMOTE COMPUTER NETWORKS

    But because of the lack of bursts, this connection probably supports quality of service, by the use of some sort of traffic shaping method. 70 fChapter 6 Conclusion The objective with this master thesis was to assist network and system-administrators in administration of remote computer networks.

  8. Master's Theses

    Topics for Master's Thesis Seminar and Projects in Network and Security. The aim of this project is to take an exemplary firewall rule set defined for the OpnSense firewall (using FreeBSD PF as the basis) and duplicate as many details as possible in a current OpenWRT (using the Linux netfilter based fw4 system) and RouterOS (with Mikrotik ...

  9. PDF Artificial Intelligence in Cybersecurity and Network

    Malware is an often-used method in cyber criminality. Malware is malicious software used to accomplish identity theft, cyber espionage, and disruptions in systems. Malware appears in the form of viruses, Trojan horses, and ransomware [24]. In contrast to a typical bug, malware is an attempt designed to cause harm.

  10. Computer Networking < North Carolina State University

    The Master of Science in computer networking may be earned through the M.S. with thesis option or through the non-thesis option. Either option may be used as preparation for further graduate study or employment in industrial research, development or design environment, although students planning to continue on for a Ph.D. should discuss the option selected with their advisors.

  11. PDF NETWORK AUTOMATION WITH PYTHON

    Author(s): Dang Ngoc An Khoa Title of the bachelor's thesis: Network Automation with Python Supervisor(s): Teemu Leppänen Term and year of completion: 2023 Number of pages: 44. This thesis aims to overview how to use Python and its variety library to automate network system operations. The idea will contain theoretically explained and ...

  12. PDF Jimma University Jimma Institute of Technology School of Computing

    Co-Advisor. y School of Computing Computer Networking and Operating System Chair Jimma, EthiopiaDeclarationI, the undersigned, declare that this thesis entitled Combination of Community Structure and Mechanism to Maximize Data Availability in Adhoc Social Network (ASNET) is my original work and has not been presented for a degree in this or any ...

  13. 59 Best Networking Dissertation Topics |Computer Networking

    Some of the important and appealing/interesting networking dissertation topics are listed below. The impact of 5G technology on mobile networks. The use of software-defined networking in data centers. The security of IoT networks. The use of network virtualization in cloud computing. The impact of edge computing on network architecture.

  14. Dissertations / Theses: 'SDN

    Consult the top 50 dissertations / theses for your research on the topic 'SDN - Software-Defined Networking.'. Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard ...

  15. Top 13 Thesis Topics in Computer Networking

    Trending Thesis Topics in Computer Networking. Reliable Future Technologies of WBAN Security. Enhanced QoS Provisioning and Control. RFID assisted Mobile Devices Identification in WSN. Node Mobility and Spectrum Handoff Management. Controlling of Radio Resources for Improved Packet Access.

  16. Thesis and Research Topics in Computer Networking?

    Therefore, I propose the following research topic for a thesis written in the field of computer networks: Improving security, procedures and techniques to protect sensitive information residing in ...

  17. Dissertations and Theses

    Wee, O. K., "Wireless Network Security: Design Considerations For An Enterprise Network," Master's Thesis, Naval Postgraduate School, March 2004. Theses 2003 Alageel, S. M., "Development of an Information Security Awareness Training Program for the Royal Saudi Naval Forces (RSNF)," Master's Thesis, Naval Postgraduate School, June 2003. ...

  18. Networking and Systems Administration MS

    Trends in network communications—unifying wired and wireless infrastructures, Cloud computing, scalability, collaboration tools, and security—can only be coalesced into reliable communication services if there are highly educated and technically proficient networking and systems administration professionals who understand both traditional and emerging communication technologies as well as ...

  19. Thesis and Research Topics in Computer Networking

    You can explore more on these topics. If you need help with thesis topics in computer networking, you can contact us. You can call us on this number +91-9465330425 or email us at [email protected] for M.Tech and Ph.D. thesis help in computer networking. You can also fill the query form on the website.

  20. Networked Digital Library of Theses and Dissertations

    The Networked Digital Library of Theses and Dissertations (NDLTD) is an international organization dedicated to promoting the adoption, creation, use, dissemination, and preservation of electronic theses and dissertations (ETDs). We support electronic publishing and open access to scholarship in order to enhance the sharing of knowledge worldwide.

  21. MS Network Projects

    In the career of MS students, simulation is as much as important. To do so, we make avail of a number of network simulation tools. We also bring it together for your notice. OMNeT++ and Matlab. OPNET and QualNet. NS-2, NS3, and also GNS3. NetSim and LTESim.

  22. Network Projects for Master Thesis Students

    Network Projects for Master Thesis Students offers broad range of research ideas and topics for students to prepare their thesis in networking. To take up a networking project, you need to have a top expert's guidance who has strong knowledge in both practical and theoretical experiments. Today, there's a lot of research on networking like ...

  23. Tim Walz wrote a master's thesis on Holocaust education, just as his

    The thesis was the culmination of Walz's master's degree focused on Holocaust and genocide education at Minnesota State University, Mankato, which he earned while teaching at Mankato West. His ...

  24. Australian breaker Raygun earns mixed reviews, praised for 'courage

    Rachael Gunn arrived in Paris as a competitive breaker excited to make her Olympic debut. She leaves an internet sensation, her performances viewed by million across social media.

  25. My Hero Academia: You're Next (2024)

    My Hero Academia: You're Next: Directed by Tensai Okamura. With Kaito Ishikawa, Yûki Kaji, Kenta Miyake, Mamoru Miyano. Izuku Midoriya, a U.A. High School student who aspires to be the best hero he can be, confronts the villain who imitates the hero he once admired.