Network Fundamentals BTech Telecommunication, Computer Networking

Assignment Help:
Write a report on your chosen topic that has been approved by your
Lecturer. Your report should include appropriate figures, about 2000 words.

Topics:
1 MAN- Metro Ethernet
2 Internetworking of Wireless LANs with Cellular (Mobile) Networks
3 Content Delivery Networks (CDN) such as Akamai
4 Tools for Troubleshooting of Wired Networks
5 Tools for Troubleshooting of Wireless Networks
6 Voice over IP (VoIP)
7 Global Positioning System (GPS)
8 Skype application
9 Protocols for providing Integrated services over Internet
10 4G Mobile network
11 Mobile IP
12 Wireless Personal Area Networks (WPAN) – Bluetooth
13 Peer to Peer Networking – such as BitTorrent
14 Cable TV networks (CATV)
15 ADSL, or ADSL2+
16 Virtual Reality Network
17 Social Networks – such as Facebook, Twitter, QQ, Whatsapp
18 Internet of Things
19 Multimedia streaming
20 Quality of service (QOS) requirements in TCP/IP networks
21 Securing the home PC
22 Wireless Local Area Networks (WLAN)
23 Virtual Private Networks
24 Cloud Computing
25 Network simulators
26 Internet access technologies
27 Protocol analysers
28 Reliable Transport Layer Protocols
29 Firewalls
30 Intrusion detection systems
31 Search Engines- such as Google, Internet Explorer

Your report should have the following general structure that includes answers to the
general questions (given below) as part of suitable sections of the report. (The exact
structure may vary based on the topic you have chosen):

• Executive Summary
• Introduction of the Topic- What the topic is about?
• Motivation – Why the topic is important?
• Issues – What specific issues the topic addresses?
• Technology or Method used in the topic- How the issues are addressed?
• Any Advantages and Disadvantages?
• Key manufacturers or Service providers?
• Any other relevant information
• Conclusions
• References in IEEE format

For your report, you need to have a clear focus and the list of sub-topics will help you
achieve that. Try to use different types of sources for your research references, for example,
websites, textbooks, research papers, etc. When you have found some information that you
think will be useful in your report, describe the main idea in your own words, and
reference/cite that source in IEEE format. That way, you can avoid the risk of plagiarising.

Related Discussions:- Network Fundamentals BTech Telecommunication

Explain the Physical layer, Explain the Physical layer The Physical lay...

Explain the Physical layer The Physical layer of the OSI model sets standards for sending and receiving electrical signals among devices. It explains how digital data (bits) ar

Time out - transport layer, Time  out Timers  are used to protect  aga...

Time  out Timers  are used to protect  against  lost packet. Each  packet  must have its own logical  timers since  only  a single  packet  will be retransmitted  after timeou

What are the features of star and ring topology, What are the features of s...

What are the features of star and ring topology The three networks have following features: star: best case is = 2, average case is = 2, worst case is = 2 ring: best case

Task of changing the ip address, 1. Bob has been given the task of changing...

1. Bob has been given the task of changing the IP address and enabling telnet access on a CISCO 2950 enterprise switch. The current IP address is 10.10.10.2/8 the new IP address

Name the standard isdn term for a native isdn modem, The marketing term 'IS...

The marketing term 'ISDN modem' was formed to help sell the ISDN idea to America. There is no such thing as an analog modulator demodulator for digital ISDN. The Terminal Adapter (

Threats to information can include, Threats to information can include ...

Threats to information can include Deletion of a file or files. Corruption, caused either by hardware problems or by a bug in the software. Theft of company data

What is fcs, FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) alg...

FCS= Frame Check Sequence CRC (Cyclic Redundancy Check) algorithm runs in switch that known as FCS (Frame Check Sequence)

Define about the term - hackers, Define about the term - hackers Every ...

Define about the term - hackers Every time technology updates itself, new techniques evolve. At the same time thieves or intruders (in the information technology line, they are

What is groupware, What is Groupware Groupware are a collection of sof...

What is Groupware Groupware are a collection of software tools that encompass a broad range of applications. Even though groupware broadly consists of applications like calend

TRAFFIC CONGESTION, Can I get help for data analysis on traffic congestion ...

Can I get help for data analysis on traffic congestion using GIS

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd