In my dissertation research, I develop techniques to improve wireless network efficiency and capacity via opportunistic wireless network architectures. My dissertation research is broadly motivated by two prevalent trends:. With an increase in the proliferation of various forms of mobile devices, wireless networks are slated to become the dominant method of network access of the future.
Such advances have begun to place a premium on radio spectrum, which is fast becoming a scarce and expensive resource. However, despite the significant growing pressures on spectrum in current wireless networks, there exist large portions of the overall spectrum that are severely under-utilized. Most wireless networks have been designed to operate within statically allocated slabs of spectrum. This approach restricts the capacity of wireless networks even when there exist opportunities to better use the spectrum.
For example, even if other portions of spectrum lie unused, Wi-Fi devices must only use the allocated 2. What implications do these trends have? The spectrum commons theory considers spectrum to be a good owned by the people and not by any private entity or the government. But entities may be given licenses to use portions of the spectrum exclusively for limited periods of time.
Hence, when viewed under the lens of this theory, these two observations point to a course of action: when a slab of spectrum is not being actively used by the licensee or incumbent , it must be available for use by another entity, insofar as there is no hindrance to the incumbent original licensee. Driven by these observations, my dissertation work has developed the principles and techniques to build opportunistic wireless networks , which work by continually seeking and using portions of spectrum currently underused by incumbents, and being agile enough to vacate portions of the spectrum if any incumbent returns.
Where might this work be applicable today?
A prominent emerging system where opportunistic wireless networking can work well is in the so-called white spaces. White spaces are those channels that, in an instant in time, are not used by the incumbents: television stations or wireless microphones. The historic decision by the Federal Communication Commission FCC in permits the operation of unlicensed devices over these white spaces, as long as such operation does not hamper incumbent operation.
WhiteFi demonstrates the need for new approaches in designing algorithms and protocols when networking over the white spaces. The key observation behind this work lies in the characterization of white spaces spectrum as being fragmented and varying spatially and temporally. Hence, it makes the case for why conventional Wi-Fi based techniques do not suffice.
Consequently, WhiteFi proposes new adaptive algorithms and protocols for spectrum assignment, association, and handoffs, which factor in the characteristics of the white spaces spectrum. Full Name Comment goes here. Are you sure you want to Yes No. Be the first to like this.
No Downloads. Views Total views.
Go explore. Topic 3: Task Computing Users in different environments may use different smart devices to complete their activities tasks. Big data is a combination of data-management technologies evolved over time. NS2 is a very good topic for an M. Following are some of the common physical topologies:. Students are advised to complete all the discussions well before the start of the proposed enrolment, so that they are not disadvantaged.
Actions Shares. Embeds 0 No embeds. No notes for slide. Thesis topics in networking 1. Thesis topics in networking - I t. Most are in areas relating to my research interests, primarily video communication and network dependability reliability , but that can cover many technical areas e.
I may be willing to supervise theses on other topics in networking if there is a very good match between your interests and background and mine. Please email me a short description of your proposal. This web page lists several possible topics intended for undergraduate theses. They reflect my research interests, and so could be expanded vastly, especially with more emphasis on fundamental theory than practical implementation to form Masters or PhD theses.
I cannot possibly do a good job of concurrently supervising all of these projects, and generally only supervise BE students per semester.
Consequently, acceptance of students for topics will be done on a competitive basis, with the best qualified students getting first choice. I'm flattered by emails that I receive from students around the world asking if I can supervise them doing these projects, but I can only supervise students at UNSW. If you are interested in any of these topics, then please email your resume and academic record s to t.
The earlier you do that and can commit to a thesis by completing a Thesis Nomination Form, available from the school office , the broader your choices will be. Request re-routing for ISP-operated CDNs Content distribution within campus using SDN Smartphones An app for really personalising computers Network dependability Automated WiFi troubleshooting Automated WiFi security troubleshooting Warn web browsers about upstream caches Automated diagnosis of network performance problems Censoring private information from network packet traces Smartphones These projects all involve developing software on smartphones, probably using Java on Android phones which can be supplied , or using Objective C on iOS devices.
In this project, you will develop a smartphone app that uses local radio communication e. Bluetooth or WiFi to automatically personalise such larger devices when you start using them and if time permits use the smartphone to augment their displays. Video communication A separate page describes the rising importance of videoconferencing, and outlines our approach to the problem. Another page, only accessible from within UNSW, describes past projects in this area, which gives context to projects that are currently on offer.
TM Youtube video packet loss and retransmission For various reasons, when stored video e. Youtube is played out, it is usually sent over TCP which attempts to ensure complete in-order delivery by retransmitting lost packets. Increasingly, users access the Internet across wireless interfaces e. WiFi for which packet loss rates can be high, causing TCP to frequently pause video in order to retransmit lost packets. This project will involve studying e. By doing this you will develop skills in running real Unified Communications systems e.
VOIP and build infrastructure that research can use to extend readily available platforms. The challenge of the project could be extended by adding face detection to prevent the laser being pointed at eyes.
NS2 Another good computer networking topic for an M. Tech thesis is NS2. NS stands for Network Simulator. It is an open-source, discrete-event based network simulator mainly used for research purpose and for teaching. It creates a simulation environment for studying the network. Visualization NS2 create network topologies and then examines the behavior of the network under any event.
The behavior is analyzed by tracing down the events.
NS2 provides text-based as well as animationbased simulations. Advantages of NS2. NS2 is a very good topic for an M. You will not only get theoretical knowledge but also practical experience of network simulator tool. You can get thesis guidance about NS2 from an expert who has practical knowledge about how to use this tool. Tech thesis topic in networking. In MANET, the nodes are self-configurable and have the ability to move freely in any direction and can link with other devices frequently. MANET was originally used as a military project in defense.
MANET have the challenges of weak signal strength, reliability, power consumption along with some other problems. MANET creates a symmetric environment such that all the nodes have identical features like responsibilities and capabilities. Some of these are:. The reliability of the transmission is affected by certain factors like data loss, interference, and blockage. This was just the introduction to MANET to give an overview of what it is if you are going with this topic for your M.
Network Security Network Security is the set of rules to ensure the safety of the network of an organization or personal network.