Choose one of the topics below for your research paper.
Submit via Campus Cruiser your research paper by Wednesday, 10:00pm on November 9.
- Wi-Fi vs. WiMAX for VoIP. Voice over Internet Protocol, VoIP, is the routing of voice conversations over the Internet or through any other IP-based network. Wi-Fi and WiMAX are competing wireless broadband technologies that are considered useful for VoIP. Write a paper discussing the pros and cons of using each for VoIP.
- Novell’s eDirectory vs. Microsoft’s Active Directory. Server-based networks use database directory services to provide centralized verification of user accounts and passwords that guard access to the network. Database directory services ensure that only users with valid account and password combinations can access certain resources on a server-based network. Two popular and competing database directory services are Novell’s eDirectory and Microsoft’s Active Directory. Write a paper that will compare and contrast these two database directory services.
- 11ac Wireless: Does it measure up? The802.11ac Wi-Fi standard (AKA: 5G Wi-Fi) is the latest on the market and offers up to 1733Mbps of wireless connection speed on the 5Ghz frequency band. It was first introduced in 2012, the new standard can now be found in many routers. The standard was developed from 2011 through 2013 and approved in January 2014. In essence, 802.11ac is a supercharged version of 802.11n (the current Wi-Fi standard that your smartphone and laptop probably use), offering link speeds ranging from 433 megabits-per-second (Mbps), all the way through to several gigabits per second. In order to achieve speeds that are dozens of times faster than 802.11n, 802.11ac works exclusively in the 5GHz band and uses a heap of bandwidth (80 or 160MHz), operates in up to eight spatial streams (MIMO), and employs a kind of technology called beamforming. The burning question everyone wants to know: Just how fast is Wi-Fi 802.11ac? There are two answers: the theoretical max speed that can be achieved in the lab, and the practical maximum speed that you will most likely receive at home in the real world, surrounded by lots of signal-attenuating obstacles. The aim of this new standard is to quadruple wireless speeds to individual clients and not just to increase the overall speed of the network. IEEE continued to refine the 802.11ac amendment based on a continuous improvement process driven by industry experts. This process created a sequence of drafts and culminated in the publication of the ratified version. It was completed at the end of 2013.Write a paper on the benefits and drawbacks of 802.11ac for use in the WLAN.
- The Advantages and Disadvantages of using Bluetooth in a WPAN. A WPAN (wireless personal area network) is a personal area network. WPAN’s are used for interconnecting devices centered on an individual person’s workspace in which the connections are wireless. Typically, a wireless personal area network uses some technology that permits communication within 10 meters, a very short range. One such technology is Bluetooth. Bluetooth is a wireless technology that enables devices to form short-range multihop wireless ad-hoc networks, or personal area networks. Write a paper on the advantages and disadvantages of using Bluetooth in a WPAN.
- Is IPv6 ready for the office? IPv6 is the long anticipated upgrade to the Internet’s primary communications protocol known as IPv4. IPv6 has a limitless number of IP addresses and built-in security. On the other hand, IPv4 supports about 4.3 billion addresses, which ran out in 2011. When all the IPv4 addresses are handed out, ISP’s and enterprises will need to support IPv6 on their networks. Write a paper on the current status of IPv6 and its various stages of deployment. Although IPv6 is only in its infancy in terms of general worldwide deployment, why has the interest in IPv6 seem to be lagging?
- Emerging Network Security Technologies. A firewall alone can no longer protect the corporate network from potentially dangerous endpoints introduced by remote users, partners, contractors, and even malicious intruders. Endpoints can call and be called. They generate and terminate the information stream. Vendors have responded with endpoint security products designed to perform “health checks” of connecting devices/users and permitting access based on the security status of that endpoint. There are three major players in endpoint security. Cisco, with its Network Admission Control (NAC), Microsoft, with its Network Access Protection (NAP) and TCG, with its Trusted Network Connect (TNC). Write a paper that will compare and contrast these three endpoint security solutions.
- Terabit Ethernet (1000 Gbps). As of 2015, 400 Gigabit Ethernet was under development, using broadly similar technology to 100 Gigabit Ethernet, but 1 Terabit Ethernet is not. Figuring out how to transmit at terabit speed is technologically daunting. Component designers are claiming the Terabit Ethernet goal is simply unrealistic because the industry is just now beginning to explore transmitting signals at serial rates greater than 25Gbps. This kind of mind-boggling level of bandwidth speed will permit networks to transfer data across a city faster than some CPUs can transfer data to memory. Write a paper on the advantages and disadvantages of using Terabit Ethernet as the standard for the future. Describe the positive and negative implications that Terabit Ethernet might have on the entertainment and medical fields. Also, discuss the advantages and disadvantages of Terabit Ethernet with Facebook and Skype.
- Samba 4.3.0 Samba is an open-source software suite available since 1992 that makes Linux servers look and act like Windows servers. The most recent version is Samba 4.2 released on March 4, 2015 as the current stable release series. Samba uses the TCP/IP protocol that is installed on the host server and when correctly configured, it allows that host to interact with a Microsoft Windows client or server as if it is a Windows file and print server. Samba 4.3.0, which is the new upcoming release series promises to be a massive leap forward in the way Samba is designed and built. September 8, 2015 was the planned release date for Samba 4.3.0. Write a paper on the current status of Samba 4.3.0 including its deployment. Describe the major benefits of Samba version 4.3.0 vs. Samba version 4.2.
- What is a router? Today’s routers perform so many different tasks that traditional definitions no longer apply. Is a router still a router even if forwarding packets is just one of its many jobs? Increasingly, more applications, such as firewalls, VPN concentration, voice gateways and video monitoring, are being piled into routers. Cisco’s Integrated Services Router for example, even boasts an optional application server blade for running scores of Linux and open source packages. Write a paper that chooses two to three new routers that are on the market today. List and explain all the many jobs that these routers perform. State the advantages and disadvantages of each router that you chose. Lastly, based on your research and what you have learned, what would you call these devices?
- The Emergence of the Mobile Cloud. Mobile and cloud computing are converging to create a new platform, one that has the potential to provide unlimited computing resources. Mobile devices are constrained by their memory, processing power, and battery life. However, combined with cloud computing, data processing and storage can happen outside of mobile devices. What IDC (an American market research, analysis and advisory firm specializing in information technology) calls the “Third Platform” will allow for better synchronization of data, improved reliability and scalability, increased ease of integration, anytime-anywhere access to business applications and collaborative services, rich user experiences, and an explosion of new services. Write a paper that expands and explains this definition of mobile cloud computing. Explain how the mobile distributed computing paradigm will lead to an explosion of these new services. Give specific examples of how mobile cloud computing is being utilized in industry and education. In addition, list the advantages and disadvantages of mobile cloud computing.
11. From the Internet of Things to the “Web of Things”. Going beyond the Internet of Things, where identifiable objects are seamlessly integrated into the information network, the Web of Things takes advantage of mobile devices’ and sensors’ ability to observe and monitor their environments, increasing the coordination between things in the real world and their counterparts on the Web. The Web of Things will produce large volumes of data related to the physical world, and intelligent solutions are required to enable connectivity, inter-networking, and relevance between the physical world and the corresponding digital world resources. Write a paper that explains what we mean by the “Web of Things” in terms of connectivity and the internetworking to link physical and digital. Explore some of the adaptive solutions to assist in efficient utilization of the Web of Things. Describe the benefits that the Web of Things offers.
12. From Big Data to Extreme Data. It’s more than the three Vs—volume, velocity, and variety—that make big data such a difficult tiger to tame. It’s that the technology world hasn’t quite caught up with the need for trained data scientists and the demand for easy-to-use tools that can give industries—from financial and insurance companies to marketing, healthcare, and scientific research organization—the ability to put the data they gather into meaningful perspective. The current era of extreme data requires new paradigms and practices in data management and analytics, and in 2016 the race will be on to establish leaders in the space. Clearly, there is the need for simpler analytics tools needed to leverage the data deluge within a network. Write a paper that explores the challenges of extreme data and the solutions for accelerating insights. Describe big data’s burden on the networking infrastructure.
13. Balancing Identity and Privacy. Social networks have quickly become the key organizing principle of Internet communication and collaboration. Although Internet-enabled social networks offer tremendous opportunities, widespread interest in and growth of these systems raises new risks and growing concerns. For instance, social network users can be bullied, their pictures can be stolen, or their status posts can reach unwanted audiences. Even when profiles don’t list any information, social graphs can be analyzed to infer personal information. Risks are also related to identity management because, in these social scenarios, an individual’s online identity, which is strictly related to reputation and trust, is less and less virtual and has more and more impact on real, offline life. A battle now exists between individual privacy and the interests of the system at large. Write a paper that describes how a network administrator can balance and protect our privacy in these social networks. Which security technology is best suited to handle this dilemma- PGP, SSH, SSL, TLS, HTTPS, Ipsec, RADIUS, WEP. Give specific reasons as to your choice. In addition, list some of the disadvantages of using specific technologies in this paradigm.