Understanding on network-related issues

Assignment Help Computer Network Security
Reference no: EM131222057

Topic Proposal for Term Paper - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest. For this assignment I would like to see your topic in a written proposal with a brief abstract. An abstract is defined as a formal document that clearly describes what you will write the paper on. You may be suggested to revise your topic after your submission is reviewed.

Please choose a FOCUSED topic that is specific enough for a term paper/project.

You have two options for the assignment.

Option 1: Research Paper

This paper can be a review paper that comments on current solutions on a specific topic, or a research paper that proposes your own opinions/solutions. You don't have to implement an application for this option. However it is fine if you wish to conduct experiments on the topics discussed. As a general rule, papers that incorporate your own comments/opinions will normally receive higher grades.

Potential topics for both options include (but not limited to) the following. Your choice of the topic is usually more specific than any of these topics.

- Performance evaluation
- Addressing & location management
- Mobility models and systems
- Quality of Service
- Wireless protocols
- Routing & multicast
- Congestion control
- Scheduling & buffer management
- Multimedia protocols
- Network applications & services

- Network architectures
- Switches & switching
- Network design & planning
- Traffic analysis & control
- Network management
- Web performance
- Peer to Peer communications
- Network Security
- Denial of Service
- Firewalls
- Intrusion detection
- Security Protocols

Some premier journals and conference proceedings in the field were listed in the course syllabus. You are required to explore useful reference papers using NSU's electronic library. IEEE, ACM, and Springer databases are good resources that can be accessed in the e-library.

For more information please visit
https://sherman.library.nova.edu/e-library/index.php?action=subject&col=n&cat=cis (NSU student ID is required to access the resources).

Click on "ACM Digital Library", "IEEE/IET Digital Library", or "SpringerLink" -> enter your credentials, then you can search by key words/author/titles/names of journals or conferences. You will have full access to copyrighted articles published by the three organizations.

Option 2: Programming Project
Students who want to do a programming project instead of a paper should submit a written project proposal. Your programming project can substitute for a paper only if your project proposal meets my approval prior to November 13. If your programming project proposal is not approved, plan to submit a paper proposal and prepare to write a paper.

You can visit sourceforge's website for a list of sample networking applications (https://sourceforge.net/directory/communications) that you may be interested in. Although you may not be able to implement a full-featured system as those shown on the website due to time constraints, an operational prototype is required for final submission.

Additional Requirements

Your proposal should be a formal document that consists of a typed one-to-two page summary of your proposed topic. Although your proposal does not need to present any conclusions, it should clearly and concisely describe the focus and a plan of your paper/project. Make your proposal as specific as possible.

Your topic proposal should contain the following parts:

1. A title of the topic.
2. A description of the paper/project you wish to work on.
3. A rough outline of the structure of your final report.
4. A list of references that your work will be based on. For a research paper, this list should contain at least 5 academic publications.

Follow the APA style for all citations and references. More information about APA can be found at the following websites.

NSU Library: https://nova.campusguides.com/apa

Purdue University: https://owl.english.purdue.edu/owl/resource/560/01/

Official APA website: https://apastyle.org/

Note that this proposal is your first attempt to locate a concrete research topic, and you have chances (before the cut-off date) to make revisions and improve your grade. I will respond with suggestions based on your proposal submission and indicate whether your proposed topic is good. In some cases, I may suggest a different topic, or ask you to write a new proposal. You can make required changes by the cut-off date of November 13 to improve your grade on the topic proposal. Based on my past experience, in very few cases the proposal can be done in a single iteration.

The paper/project report itself is due on December 11. It should have no less than 15 pages, double-spaced and not counting the title page, table of contents, bibliography, or any figures. For a research paper, it should include a bibliography of no fewer than five sources that appear as references in the body. Your paper/project report should use headings and sub-headings to reflect

its structure. Please proofread your paper/report carefully to ensure that it contains no spelling or grammatical errors. It should conform to the standards of academic integrity described in the graduate catalog and the course syllabus.

Additional Suggestions

1. It is not appropriate to write on a very broad topic such as network security, cryptography, multimedia network protocols, wireless protocols, etc. Keep in mind that this is just a short term paper that should fit into a limited time period. You can actually find a textbook for most of these topics. Please choose a topic as specific as possible.

2. A review paper usually should include multiple (>=5) references. I would like to see references from referred conference proceedings or journals. IEEE, ACM, and Springer databases are widely used by the research community. References such as Wikipedia can be used at the early stages when you explore a topic, but you are discouraged from using them since the information are generally considered volatile for scientific papers. Usually you should summarize different resources instead of reiterating the exact words. It is also important to show your ability on critical thinking - I wish you include as many comments (in your own words) as possible.

3. It is fine to choose the programming project option for the assignment. Generally this option needs more efforts than a research paper option. You can implement something new or simulate the functionalities of existing applications - please make your choice clear in the proposal. You will need to deliver a working prototype in your final submission. The functionalities of this prototype need to be briefly discussed in the proposal.

4. Please note if you cite the exact words from references, you need to use quotation marks on both sides. The paper may be considered plagiarism for failing to do so. You should also pay attention to the use of enough citations so that a reader can separate your work from others easily. For more information on the integrity policy please refer to the course syllabus and CEC's Graduate Catalog (https://cec.nova.edu/documents/catalog.pdf).

5. If you plan to propose your own solutions on an existing problem, that would be great. Try your best and you may end up with a publication based on your course work. I will be happy to assist you during the process.

6. Please note that for all references and citations, you need to follow the APA format style. This is a requirement by CEC. Failing to do so may lead to the loss of points on your submission.

Verified Expert

The work is chosen for the congestion control in the networks. it is in 4500 words in APA format in MS word. the focus has been on handling the different standards of teh congestion with the control of the network supply of the data. it also includes the different techniques, solutions and the listing of the approaches as to how there is a possibility to handle the flow of the data in the network.

Reference no: EM131222057

Questions Cloud

Problem regarding the emotional intelligence : "Emotional Intelligence" Please respond to the following: Read the blog post on emotional intelligence titled, "The Case for Hiring Emotionally Intelligent Leaders". Next, give your opinion on the most important competency of emotional intelligenc..
Plot given index and a second line : The Federal Reserve Bank of St. Louis publishes a weekly index of financial stress (FRED code: STLFSI) that summarizes strains in financial markets, including liquidity problems.
According to the control chart parameter table : 1. What is X-bar-bar? Round your answer to two decimals. 2. What is R-bar? Round your answer to two decimals. 3. According to the control chart parameter table, what is A2? Round your answer to two decimals.
Analyze relationship between the organizational structure : Suggest how a typical software engineering team could be staffed and describe each team member's role. Determine the skills that are required for each team member for the success of the software project development.
Understanding on network-related issues : CISC650 Computer Networks - In order to show understanding on network-related issues, each student is expected to complete a paper on a relevant network topic of the students choosing and interest.
Conduct a bottom up analysis of current financial situation : HA1022 Principals of Financial Markets Group Assignment. Conduct a Bottom Up analysis of companies' current financial situation. Consider accounting ratios and measures of a firm's performance, how these need to be compared to the industry and comp..
Collective bargaining agreement versus federal : 1. Can State, or local law, pass compensation laws that differ from Federal Law, e.g the FLSA? 2. Which has precedent, a collective bargaining agreement versus Federal, State or local laws/regulations? 3. What is the difference between regular hours ..
How many skiers are leaving lavilla : LaVilla is a village in the Italian Alps. Given its enormous popularity among Swiss, German, Austrian, and Italian Skiers, all of its beds are always booked in he winter season and there are, on average, 1,514 skiers in the village. On average, s..
Senior leadership and presenting strategic options : If you were in senior leadership and presenting strategic options for growth, which strategy would you recommend?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Extract the password hashes from a machine

Extract the password hashes from a machine

  Explain problems nats create for ipsec security

Discuss some of the problems NATs create for IPsec security. Solve problems by using IPv6? Why deployment of IPv6 has been slow to date. What is needed to accelerate its deployment

  Describe how bob can recover the message

FIT3031 - Information & Network Security - Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in CBC mode and describe how Bob can recover the message m from (v || c) using k.

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  Intel processors preparation

Compare and contrast the different Intel processors in Android phone and tablets. Practice converting between decimal and binary. This is the language of the computer, so you need this skill to understand how a computer works

  Maintain an online reflective blog

Maintain an online reflective blog/journal and write blog posts/entries based on academic articles and conduct a research of the Internet on the topics as listed at the top of this assessment detail.

  Describe as the explosive growth in digital crime

Name at least three factors that have lead to what some authors describe as the "explosive growth" in digital crime and cyber victimization. Provide some examples of what an individual can do to reduce the chance of becoming a victim.

  How many comparisons between hash values are needed

How many comparisons between hash values are needed in the worst case - compute in the worst case?

  Examine major challenge of enforcing policy concerning byod

Describe at least two (2) types of loss that can occur that a standard homeowners insurance policy does not cover. List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.

  At what generation did video downloads and reasonably fast

answer the following test your understanding questions from chapter 8 using apa style and form nbspnbsp a. what are

  After the 911 attacks there has been an increased demand

after the 911 attacks there has been an increased demand for private security services. post to the discussion board

  The 2 main types of communications media used for network

the 2 main types of communications media used for network connections are wired connections and wireless connections.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd