0% found this document useful (0 votes)
13 views5 pages

CN Assignment

Assignment of computer network

Uploaded by

bajwaumair320
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views5 pages

CN Assignment

Assignment of computer network

Uploaded by

bajwaumair320
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Assignments and Complex Engineering Problem for Computer

Networks (EE-432)

Group No Group Members Assigned Topic


1. UMER ASHIQ (L) Network Topologies
M. HUSNAIN
SAUD AHMED
2. MUHAMMAD USMAN IP Addressing and Subnetting
ABOUZAR HUSNAIN
MUHAMMAD ALI (L)
3. TOSEEQ HAIDER (L) Routing Protocols
M. UMAIR
ANEES UR REHMAN
4. MUJEEB UR REHMAN Satellite IoT
MUHAMMAD MASAB (L)
ZOHAIB RAFI
5. NIMRA SALEEM Comparative Analysis of Multiple Access Techniques
HASNAIN ABBAS
ABDULLAH KHAN (L)
6. MUHAMMAD SHAHAN Quality of Service (QoS)
(L)
MUHAMMAD OWAIS
M. TAIMOUR USMAN
7. M. ZEESHAN (L) Virtual Private Networks (VPN)
M. HAMZA
M. ABU BAKAR
8. HASEEB ULLAH KHAN (L) Network Security
ZAIN UL ABEDEN
JAHANZAIB ZAIDI
9. SYED M. TALHA Software-Defined Networking (SDN)
SAMMAD ALI (L)
ZAIN ALI
10. ALI RAZA (L) Industrial IoT
M. HASNAIN SARDAR
M. AWAIS
11. USMAN SAJID Internet of Things (IoT) Networking
M.TANVEER (L)
M. JAMSHAID
12. IQRA ARSHAD (L) Cloud Networking
M. REHAN
KHALIL AHMAD
13. ABSAT AMJAD (L) Network Virtualization
SALEEM HUSSAIN
AFZAAL MUNFAIZ
14. MIRZA M. UMAR (L) Wireless Networking
RANA M. AHAD
MUHAMMAD SUFYAN
15. AYESHA SHAMIM (L) Edge and Fog Computing
HUNAIN ZAIDI
ABDUL REHAN

1. Network Topologies

 Assign 1: Overview of different topologies (e.g., star, mesh, bus, ring).

 Assign 2: Advantages and disadvantages of each topology.

 Assign 3: Real-world applications of various topologies.

 Assign 4: Simulation/Performance Analysis: Use Cisco Packet Tracer to simulate different


topologies and analyze latency, packet loss, and network throughput.

2. IP Addressing and Subnetting

 Assign 1: Introduction to IP addressing (IPv4 and IPv6).

 Assign 2: Subnetting principles and techniques.

 Assign 3: Address planning for a large network.

 Assign 4: Simulation/Performance Analysis: Design a subnetted network using GNS3 and


analyze network efficiency, traffic distribution, and broadcast domain sizes.

3. Routing Protocols

 Assign 1: Overview of common routing protocols (e.g., OSPF, BGP, RIP).

 Assign 2: Differences between distance-vector and link-state protocols.

 Assign 3: Real-world application and configuration of routing protocols.

 Assign 4: Simulation/Performance Analysis: Simulate routing protocols with Cisco Packet


Tracer and compare convergence time, route stability, and bandwidth usage.

4. Satellite IoT

 Assign 1: Overview of what is satellite IoT and its applications.

 Assign 2: Random access in Satellite IoT: Problems and solutions

 Assign 3: Techniques used for reducing delay and increasing throughput.

 Assign 4: Simulation/Performance Analysis: Use simulation tool to get results related to delay,
throughput, channel utilization etc.

5. Comparative Analysis of Multiple Access Techniques


 Assign 1: Introduction to multiple access techniques and their types.

 Assign 2: How each multiple access technique works (e.g., Complete working mechanism).

 Assign 3: Comparison in working of these techniques.

 Assign 4: Simulation/Performance Analysis: Access delay, throughput, complexity.

6. Quality of Service (QoS)

 Assign 1: Introduction to QoS and its importance in networks.

 Assign 2: Techniques for implementing QoS (e.g., traffic shaping, priority queuing).

 Assign 3: Real-world scenarios where QoS is critical (e.g., VoIP, video streaming).

 Assign 4: Simulation/Performance Analysis: Use GNS3 to simulate QoS policies and measure
jitter, latency, and packet loss.

7. Virtual Private Networks (VPN)

 Assign 1: Basics of VPNs and their use cases.

 Assign 2: Different types of VPNs (e.g., site-to-site, remote access).

 Assign 3: Security considerations and protocols used in VPNs (e.g., IPSec, SSL).

 Assign 4: Simulation/Performance Analysis: Simulate a VPN using Cisco Packet Tracer and
analyze encryption overhead, latency, and bandwidth utilization.

8. Network Security

 Assign 1: Introduction to network security concepts and threats.

 Assign 2: Techniques for securing networks (firewalls, encryption, IDS/IPS).

 Assign 3: Case studies of network breaches and security measures.

 Assign 4: Simulation/Performance Analysis: Use Wireshark to simulate a network attack and


measure intrusion detection time, attack impact, and recovery time.

9. Software-Defined Networking (SDN)

 Assign 1: Introduction to SDN and its architecture.

 Assign 2: Benefits and challenges of implementing SDN.

 Assign 3: Use cases of SDN in modern networks.

 Assign 4: Simulation/Performance Analysis: Use Mininet to simulate an SDN environment and


analyze control plane efficiency, network programmability, and traffic management.

10. Industrial IoT

 Assign 1: Introduction of Industrial IoT and its applications


 Assign 2: Standard used for Industrial IoT, random access and other processes, problems and
solutions.

 Assign 3: Techniques used for reducing delay and increasing throughput.

 Assign 4: Simulation/Performance Analysis: Use simulation tool to get results related to delay,
throughput, channel utilization etc.

11. Internet of Things (IoT) Networking

 Assign 1: Basics of IoT and its impact on networking.

 Assign 2: IoT protocols and communication standards

 Assign 3: Security challenges in IoT networks.

 Assign 4: Simulation/Performance Analysis: Simulate an IoT network using simulation tool and
measure data latency, packet delivery ratio, and energy consumption.

12. Cloud Networking

 Assign 1: Overview of cloud computing and cloud network architecture.

 Assign 2: Key cloud networking technologies (e.g., virtual networking, SD-WAN).

 Assign 3: Security concerns in cloud networks.

 Assign 4: Simulation/Performance Analysis: Use CloudSim to simulate cloud network scenarios


and analyze network scalability, response time, and bandwidth usage.

13. Network Virtualization

 Assign 1: Introduction to network virtualization concepts.

 Assign 2: Virtual LANs (VLANs) and their implementation.

 Assign 3: Benefits and challenges of network virtualization.

 Assign 4: Simulation/Performance Analysis: Simulate virtual network environments using


VMware NSX and analyze resource allocation, network isolation, and performance overhead.

14. Wireless Networking

 Assign 1: Basics of wireless communication and standards

 Assign 2: Security concerns in wireless networks.

 Assign 3: Setting up a wireless network and access points.

 Assign 4: Simulation/Performance Analysis: Simulate a wireless network using simulation tool


and analyze signal strength, interference levels, and data throughput.

15. Edge and Fog Computing

 Assign 1: Introduction to edge and fog computing concepts.


 Assign 2: Differences between edge, fog, and cloud computing.

 Assign 3: Use cases and benefits of edge/fog computing in networks.

 Assign 4: Simulation/Performance Analysis: Simulate an edge/fog computing environment


using iFogSim and measure latency, data processing efficiency, and network bandwidth usage.

Sr. No. Assignment Deadline Deliverables CLO PLO


1. Assign 1 October 15, Presentation 1 1
2024
2. Assign 2 November 01, Presentation 2 2
2024
3. Assign 3 November 15, Presentation 2 2
2024
4. Assign 4 December 01, Presentation 3 3
2025
5. Complex Engineering December 15, Written report of at least 20 3 3
Problem 2024 pages following the given
guidelines

Instructions:

 Late submissions will not be accepted

 Zero tolerance policy on plagiarism. Final report should have less than 15% similarity index and
less than 5% AI content

 Final report for CEP should be of at least 20 pages (in latex format) including references

 The references should be properly cited, and at least 40 references should be used

 The report must be on the following given journal template:


https://www.overleaf.com/latex/templates/mdpi-article-template/fcpwsspfzsph

 You can seek my help if you face any difficulty

You might also like