Vous êtes sur la page 1sur 4

Term Papers for CSE883 Sr.

No 1,31,61,91,12 1 Topic Description User Datagram Show the working of UDP protocol that the Protocol data is to be transferred on the basis of routing tables .Show this with the help of flash Transmission Control Protocol Show the working of TCP protocol that first the connection is established than the data is to be transferred. Show this with the help of flash

2,32,62,92,12 2

3,33,63,93,12 3

Domain System

Name Develop an animation to show that how the name has been changed to ip address and ip address changed to name. Also write the theory along with it.

4,34,64,94,12 4

5,35,65,95,12 5

Dynamic Host Discuss the use and benefits of a DHCP Configuration server. How the configuration is done and IPs Protocol allocated. Write down and show the steps using the snapshots. Also discuss the differences with BootP File Transfer Show the working of FTP protocol by creating Protocol a scenario of sending an file from one PC to another.show the animation in flash and also write the theroy. Wireless LAN Comprehensive study of the Wireless LAN, what all is required to set it up and how does it work. Mention all the equipments used the transmission techniques and other salient features. Set up a dummy network to justify the concepts. Also provide a historic view of the topic. Mention some applications of the same as well. Take snapshots of actual configuration steps to illustrate the steps, use a simulator. Discuss the various type of software and hardware firewall. Both the Packet filter and Proxy Firewall should be discussed. Demonstrate the use with the help of the Cisco Pix firewall Show the working of IP using Flash/ create animation how is it used at the network layer for packing and unpacking packets. Discuss the ways in which these attacks can in occur. How can we minimize of eliminate the

6,36,66,96,12 6

7,37,67,97,12 7

Firewalls

8,38,68,98,12 8 9,39,69,99,12 9

IP Unauthorized Access, Man

the attacks. 10,40,70,100, 130 VPN

11,41,71,101, 131

IrDA

12,42,72,102 13,43,73,103 14,44,74,104

VLSM

15,45,75,105

16,46,76,106

17,47,77,107

18,48,78,108 19,49,79,109

Binary Game Private / Public IP Create a game where an ip runs into addressing Game gateway, all public ips should pass and private should be blocked, user input must be taken Unicast, Create a game where multiple devices are Broadcast, shown and the system chooses 2 devices, Multicast packet user is asked to identify what kind of game communication will take place. VLANs Comprehensive study of the VLANs Infrastructure, what all is required to set it up and how does it work. Why are they required, what benefits do we get out of establishing VLANs. Take a real time example to justify the concept, use of NetSim Simulator is advisable. IP Level Security What is the actual technique? How can we ensure IP Level Security? What all protocols and techniques are used to establish the Security? What are the various fields in which this type of Security is apt. MAC Mac-addresss-table buliding of switch CIDR Discuss the methods used for CIDR, how is it beneficial as compared to other techniques of addressing. Set up a network and put addresses based on CIDR technique to illustrate the concept. Hands free Comprehensive study of the various devices, operations of Cell protocols and techniques used. Mention some Phones of the areas where these techniques are implemented. WEP & WEP Create an animation to show the usage of issues WEP , illustrate the drawback by creating the animation on - How can it be cracked? One

middle causes of attacks. Show the attack at work with the help of examples. CREATE an ANIMATION for the same What is the actual technique? Why is it required? How to actually set up the connection? What all protocols are used? Discuss a real time application to Justify the use of VPN , create animation Discuss the ins and out of the IrDA, where does this technique stand in context to various other techniques, what are the strengths and downsides of using this technique. Do mention the areas where it is used. Complete study of IP addressing, various classes, Subnetting, Super netting, VLSM. Demonstrate the use purpose with the help of CASE Studies. Maths Create a bricks like game for IP addressing

20,50,80,110

21,51,81,111

22,52,82,112

E-mail Clients

23,53,83,113

RIP v2

should be able to give real time values and show that it can be cracked. Discuss the various Email clients that are available in the market and illustrate the concept of IMAP /POP. Set up a Microsoft outlook, outlook express, thunderbird connection on your laptop first with IMAP and the with POP, create a power point of the same. Configure the RIP version 2 by taking an example of your choice. use the snapshot to create a animation in flash that how the packets are being transferred. Discuss the concept of X.25, Frame Relay and ATM in detail. The various devices used should also be labelled and a diagrammatic representation of the working should be presented. Discuss the concept of remote login using the Telnet software, write the actual commands used for the purpose of Telnet / Terminal Server and show with the snapshots how connectivity is made, use windows remote connection / team viewer as well and create an animation of the same Clear explanation, Take a plaintext and use proper key show the encryption process step by step using animation, clearly explain brute force attack on the same taking example(refer text book)

24,54,84,114

Switched WANs

25,55,85,115

Remote Login

26,56,86,116

Ceasar cipher

27,57,87,117

28,58,88,118

29,59,89,119

30,60,90,120

Network Address Illustrate the concept of NAT focusing on its Translation purpose and achievement. How does the Address Translation take place and the Transition Table building up process should also be discussed, prepare a game in flash, which shows whether the IP is private or not Mobile IP Address the concept of stationary and mobile hosts along with home and foreign agent. Discuss the problems faced by mobile devices such as Double Crossing and Triangle Routing ARP Discuss the use of ARP, the concept, packet format and various scenarios of the use of the mentioned protocols should be discussed. Create an animation of the same. Show the Animations of Switch to be created in flash working of switch showing that first time switch broadcast the data packets and then when mac-address-

table is build it starts unicasting.

Vous aimerez peut-être aussi