Spring 2019
ENSC 427: COMMUNICATION NETWORKS

FINAL PROJECTS:


  • 1. Ricardo Dupouy, Robin Qumsieh, and Shahira A. Azhar
        (ricardo_dupouy at sfu.ca, rqumsieh at sfu.ca, shahiraa at sfu.ca)

    Comparing the measurement of quality of experience (QoE) for Spotify on a WiFi Network (SFU) vs LTE or 3G

    Abstract:
    University students commonly prefer to access the Internet using their own cellular data connection, even when school provided WiFi is available. Low throughput, high latency, and inconsistent connections are commonly cited as reason for these preferences. This paper strives to measure and compare the Quality of Experience (QoE) on a university WiFi network with that on a Cellular networking using LTE and 3G technology. The popular music streaming service, Spotify is used as a platform for the research.

    References:
    [1] G. Kreitz and F. Niemela, "Spotify – Large Scale, Low Latency, P2P Music-on-Demand Streaming," 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P), Delft, 2010, pp. 1-10. doi: 10.1109/P2P.2010.5569963
    [2] R. Yanggratoke, G. Kreitz, M. Goldmann and R. Stadler, "Predicting response times for the Spotify backend," 2012 8th international conference on network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm), Las Vegas, NV, 2012, pp. 117-125.
    [3] R. Yanggratoke, G. Kreitz, M. Goldmann, R. Stadler and V. Fodor, "On the Performance of the Spotify Backend," Journal of Network and Systems Management, 2013, vol. 23, no. 1, pp. 210-237. doi: https://doi-org.proxy.lib.sfu.ca/10.1007/s10922-013-9292-2
    [4] M. Goldmann and G. Kreitz, "Measurements on the spotify peer-assisted music-on-demand streaming system," 2011 IEEE International Conference on Peer-to-Peer Computing, Kyoto, 2011, pp. 206-211. doi: 10.1109/P2P.2011.6038737
    [5] M. Ellis, S. D. Strowes and C. Perkins, "An experimental study of client-side spotify peering behaviour," 2011 IEEE 36th Conference on Local Computer Networks, Bonn, 2011, pp. 267-270. doi: 10.1109/LCN.2011.6115205
    [6] S. Liu and A. Striegel, "Casting doubts on the viability of WiFi offloading," Proceedings of the 2012 ACM SIGCOMM workshop on Cellular networks: operations, challenges, and future design - CellNet 12, Helsinki, 2012, pp. 25-30. doi: 10.1145/2342468.2342475
    [7] S. Liu, A. Striegel, X. Hu, and L. Meng, "LTE and WiFi: Experiences with Quality and Consumption," Procedia Computer Science, 2014, vol. 34, pp. 418-425. doi: 10.1016/j.procs.2014.07.048


  • 2. Victor Yun, Peter Xu, and Nathan Batke
        (vyun at sfu.ca, peterx at sfu.ca, and nbatke at sfu.ca)

    Analysis of WiFi performance in the 2.4GHz and 5GHz band

    Abstract:
    Nearly a decade ago in 2009, IEEE established the 802.11n standard which provided both the 2.4GHz and 5GHz band to users. The new technology proposed higher speed and less congestion in the new frequency range, but it came at a trade-off of shorter distance and lower penetration power through obstacles. Using ns-3, we will analyze different operating scenarios and compare the performance of the two different frequency band WiFi.

    References:
    [1] A. Kamerman, G.Aben. "Throughput performance of wireless LANs operating at 2.4 and 5 GHz," in 11th IEEE International Symposium on Personal Indoor and Mobile Radio Communications. PIMRC 2000. Proceedings (Cat. No.00TH8525). Sept 2000. [Online]. Available: https://ieeexplore-ieee-org.proxy.lib.sfu.ca/document/881416. [Accessed Feb 2019].
    [2] J. M. Park et al.. "Coexistence of Wireless Technologies in the 5 GHz Bands: A Survey of Existing Solutions and a Roadmap for Future Research," in IEEE Communications Surveys & Tutorials. Vol.20 Issue 3. 13 March 2018. [Online]. Available: https://ieeexplore-ieee-org.proxy.lib.sfu.ca/document/8315104. [Accessed Feb 2019].
    [3] I. Dolinska et al., "Interference comparison in Wi-Fi 2.4 GHz and 5 GHz bands," in 2017 International Conference on Information and Digital Technologies (IDT). July 2017. [Online]. Available: https://ieeexplore-ieee-org.proxy.lib.sfu.ca/document/8024280. [Accessed Feb 2019].
    [4] J. A. R. Pacheco de Carvalho et al., "Performance Evaluation of 5 GHz IEEE 802.11n WPA2 Laboratory Links," in Proceedings of the World Congress on Engineering 2017 Vol I. July 2017. [Online]. Available: http://www.iaeng.org/publication/WCE2017/WCE2017_pp524-528.pdf. [Accessed Feb 2019].
    [5] Thongchai Kaewkiriya, "Performance comparison of Wi-Fi IEEE 802.11ac and Wi-Fi IEEE 802.11n," in 2017 2nd International Conference on Communication Systems, Computing and IT Applications (CSCITA). 7-8 April 2017. [Online]. Available: https://ieeexplore-ieee-org.proxy.lib.sfu.ca/document/8066560. [Accessed 02 Feb 2019].


  • 3. Sheung Yau Chung, Cheng Chen, and You Tao
        (sychung at sfu.ca, cca175 at sfu.ca, and tyou at sfu.ca)

    Evaluation of MANET Performance in Presence of Non-cooperative Nodes

    Abstract:
    A wireless ad-hoc network (MANET) is an infrastructure-less wireless network with self-configuring nodes. In this paper, we use Riverbed Modeler 17.5 to simulate packet dropping attack for MANET under AODV routing protocol. We analyze the throughput, load, delay, and packet dropped in static, less dynamic mobility scenarios. Simulation results indicate that the MANET performance is greatly affect by the presence of non-cooperative nodes.

    References:
    [1] S. Lally and L. Trajkovic, “Performance Analysis of Routing Protocols for Wireless Ad-Hoc Networks,” rep, [online document], available: http://www2.ensc.sfu.ca/~ljilja/papers/Opnetwork2011_lally_final.pdf
    [2] H. T. Vu, M. Thoppian, A. Mehdian, S. Venkatesan, R. Parakash, and A. J. Anderson, “Real-time simulations of Mobile Ad-hoc Networks (MANET) in Opnet Modeler,” rep, [online document], available: https://pdfs.semanticscholar.org/c1f5/86d2f7a1cad00e92f18a3087294b0754a70a.pdf
    [3] M. Bhatt, H. Patel, and S. Kariya, “Detection and Prevention of Black Hole Attack in MANET,” International Journal of scientific research and management, vol. 4, no. 2, pp. 534-542, 2016.
    [4] M.Schütte, "Detecting Selfish and Malicious Nodes in MANETs,", SEMINAR: SICHERHEIT IN SELBSTORGANISIERENDEN NETZEN, HPI/UNIVERSITÄT, POTSDAM, Summer 2006, pp. 1-7.
    [5] R.Das, S. Bal, S. Das, M. K. Sarkar, D. Majumder, A. Chakraborty, and K. Majumder, “Performance analysis of various attacks under AODV in WSN & MANET using OPNET 14.5,” 2016 IEEE 7th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON), New York, NY, USA, 2016, pp. 1-9.


  • 4. Carson Ka Sing Lai and Princess Krizia Torio Macanlalay
        (ckl41 at sfu.ca and pmacanla at sfu.ca)

    Gaming through different transmission media and connection types (Fibre, Ethernet, Cable, Wifi, LTE)

    Abstract:
    Today, gaming has become an everyday addiction for kids, teens, and adults. From casual gamers to hard core gamers, game developers need to provide a balanced service to accommodate the latency and packet losses. Our project will explore how modern multiplayer games handle a variety of network issues and how a player's choice in link type can affect their gameplay.

    References:
    [1] "AVM," [Online]. Available: https://en.avm.de/guide/gaming/wifi-or-cable-which-is-better-for-gaming/. [Accessed 5 February 2019].
    [2] C. Harper, "maketecheasier," 14 March 2017. [Online]. Available: https://www.maketecheasier.com/ethernet-vs-wifi-in-gaming/. [Accessed 5 February 2019].
    [3] B. Team, " BroadbandNow," 16 October 2018. [Online]. Available: https://broadbandnow.com/guides/dsl-vs-cable-vs-fiber. [Accessed 2 February 2019].
    [4] R. Hirota and S.-I. Kuribayash, "Evaluation of fairness in multiplayer network games," Proceedings of 2011 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing, 2011.
    [5] M. Dammak, I. Andriyanova, Y. Boujelben, and N. Sellami, "Routing and Network Coding Over a Cyclic Network for Online Video Gaming," IEEE Communications Letters, vol. 22, no. 6, pp. 1188-1191, 2018.
    [6] S. Zander, I. Leeder, and G. Armitage, "Achieving fairness in multiplayer network games through automated latency balancing," Proceedings of the 2005 ACM SIGCHI International Conference on Advances in computer entertainment technology - ACE 05, 2005.
    [7] K. Raaen and A. Petlund, “How much delay is there really in current games?,” Proceedings of the 6th ACM Multimedia Systems Conference on - MMSys 15, 2015.


  • 5. Derrick Lee, Eric Kwok, and Duncan Yee
        (dgl3 at sfu.ca, eka34 at sfu.ca, and duncan_yee at sfu.ca)

    KRACK - The Destruction of WiFi

    Abstract:
    WPA2 is a security protocol for wi-fi wireless networks. In the protocol, four messages are sent between the client and the access point in order to establish a secure connection. KRACK (Key reinstallation) attack allows an attacker to read network traffic that should be secure. The attack is aimed at the WPA2 protocol itself, so many devices using the protocol are vulnerable. The attack is carried out by intercepting and retransmitting the third message of the handshake. Each time the client receives the third message, it will reset its nonce and reencrypt the fourth message with the same key. From these retransmitted messages, the key can be deciphered, without ever having access to the router network password.

    References:
    [1] L. Epia Realpe, O. Parra and J. Velandia, "Use of KRACK Attack to Obtain Sensitive Information", Mobile, Secure, and Programmable Networking, pp. 270-276, 2019. Available: https://link-springer-com.proxy.lib.sfu.ca/chapter/10.1007/978-3-030-03101-5_22. [Accessed 10 February 2019].
    [2] C. Kohlios and T. Hayajneh, "A Comprehensive Attack Flow Model and Security Analysis for Wi-Fi and WPA3", Electronics, vol. 7, no. 11, p. 284, 2018. Available: https://www.mdpi.com/2079-9292/7/11/284/htm. [Accessed 10 February 2019].
    [3] S. Naitik, P. Vernekar and V. Shetty, "Mitigation of KeyReinstallation Attackin WPA2 Wi-Fi networks by detection of Nonce Reuse", International Research Journal of Engineering and Technology(IRJET), vol. 05, no. 05, p. 1531, 2018. Available: https://www.irjet.net/archives/V5/i5/IRJET-V5I5290.pdf. [Accessed 10 February 2019].
    [4] T. Chin and K. Xiong, "KrackCover: A Wireless Security Framework for Covering KRACK Attacks", Wireless Algorithms, Systems, and Applications, vol. 10874, pp. 733-739, 2018. Available: https://link-springer-com.proxy.lib.sfu.ca/chapter/10.1007/978-3-319-94268-1_60. [Accessed 10 February 2019].
    [5] R. Fontes and C. Rothenberg, "On theKrack Attack: Reproducing Vulnerabilityand a Software-Defined Mitigation Approach", Pdfs.semanticscholar.org, 2017. [Online]. Available: https://pdfs.semanticscholar.org/75a9/0c06511671f0d3e9175c8cfb3ce5ed3ebd84.pdf. [Accessed: 10- Feb- 2019].
    [6] M. Vanhoef and F. Piessens, "Key Reinstallation Attacks: Forcing Nonce Reuse in WPA2", Papers.mathyvanhoef.com, 2017. [Online]. Available: https://papers.mathyvanhoef.com/ccs2017.pdf. [Accessed: 10- Feb- 2019].


  • 6. Xue Qing Bin, Peng Cheng Li, and Jia Hui Xiao
        (mbin at sfu.ca, pla68 at sfu.ca, and mandyx at sfu.ca)

    Analyzation of Gaming Using Peer to Peer Paradigm

    Abstract:
    The internet gaming industry has quickly grown to be one of the predominant pastimes for people of all ages. It is resource intensive but required to hold a high standard for timing requirements. This project does a comprehensive research on internet gaming using P2P paradigm where a peer sends and receives packet information from other peers. It also dives into benefits such as minimizing lag and issues surrounding security. All network simulations is performed in Riverbed.

    References:
    [1] F. Bevilacqua, "Building a Peer-to-Peer Multiplayer Networked Game", Game Development Envato Tuts+, 2013. [Online]. Available: https://gamedevelopment.tutsplus.com/tutorials/building-a-peer-to-peer-multiplayer-networked-game--gamedev-10074. [Accessed: 08- Feb- 2019].
    [2] C. GauthierDickey, D. Zappala, V. Lo and J. Marr, "Low Latency and Cheat-proof Event Ordering for Peer-to-Peer Games", delivery.acm.org, 2019. [Online]. Available: http://delivery.acm.org/10.1145/1010000/1005877/p134-gauthierdickey.pdf?ip=142.58.76.52&id=1005877&acc=ACTIVE%20SERVICE&key=FD0067F557510FFB%2E87ED2FCA0B39BEF5%2E4D4702B0C3E38B35%2E4D4702B0C3E38B35&__acm__=1549665331_278400722e186e645275845f2231b912. [Accessed: 08- Feb- 2019].
    [3] C. Neumann, M. Varvello, N. Prigent and K. Suh, "Challenges in Peer-to-Peer Gaming"Ccr.sigcomm.org. [Online]. Available: http://ccr.sigcomm.org/online/files/p2p_gaming.pdf. [Accessed: 08- Feb- 2019].
    [4] A. Yahyavi and B. Kemme, "Peer-to-peer architectures for massively multiplayer online games", 2013. [Online]. Available: https://www.contrib.andrew.cmu.edu/~ayahyavi/files/Yahyavi-CSUR13-P2PMMOG.pdf. [Accessed: 08- Feb- 2019].
    [5] E. Buyukkaya, M. Abdallah and R. Cavagna, "VoroGame: A Hybrid P2P Architecture for Massively Multiplayer Games - IEEE Conference Publication", Ieeexplore.ieee.org, 2019. [Online]. Available: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=4784788. [Accessed: 08- Feb- 2019].


  • 7. Justin Kenta Aoki, Kevin Edward Corbett, and Jonathan Andrew Dizon de Guzman
        (jkaoki at sfu.ca, kecorbet at sfu.ca, and jdeguzma at sfu.ca)

    Comparing the performance between 2.4GHz and 5GHz Wi-Fi networks

    Abstract:
    Multiple Canadian telecommunications companies offer dual-band routers, which supports network access on both 2.4 GHz frequencies as well as 5 GHz frequencies. Both frequencies can provide different utility, with 2.4 GHz known for having a longer functioning range, and 5.0 GHz known for having better speed and bandwidth. As the 2.4 GHz band has become more and more crowded over the years, networks are starting to swap over to the 5 GHz band. Through multiple ns-3 simulations, we investigate the differences in using Wifi from varying ranges, as well as using both 2.4 GHz bandwidth as well as 5.0 GHz bandwidth. Various operational parameters, such as network performance and reliability, will be tracked between the bands. We will also explore the optimal usage of each network on various devices and applications.

    References:
    [1] IEEE Standard for Information Technology - Telecommunications and Information Exchange Between Systems - Local and Metropolitan Area Networks - Specific Requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications. (2007). Piscataway, USA: IEEE.
    [2] Hidayab, M., Ali, A., & Abas Azmi, K. (2009). Wifi signal propagation at 2.4 GHz. Microwave Conference, 2009. APMC 2009. Asia Pacific,528-531.
    [3] Ghwanmeh, S., and Al-Zoubidi, A. (2006). “Wireless Network Performance Optimization Using Opnet Modeler,” Information Technology Journal, 5: 18-24
    [4] R. Paul, S. Lally, and Lj. Trajkovic, "Simulation and performance evaluation of WiFi and WiMAX using OPNET,"OPNETWORK 2011, Washington, DC, Aug. 2011. Washington, DC, Aug. 2002
    [5] K. Topher, "Diagnosing and addressing Wi-Fi signal quality problems," 2011. [Online](Accessed Feb 12, 2015) Available: http://www.cnet.com/news/diagnosing-and-addressing-wi-fi-signal-quality-problems (Links to an external site.)Links to an external site.
    [6] "WiFi Direct Data Performance Tests," Microsoft, [Online]. Available: https://msdn.microsoft.com/en-us/library/windows/hardware/dn247504.aspx (Links to an external site.)Links to an external site.
    [7] "What is Wi-Fi?," [Online]. Available: http://www.webopedia.com/TERM/W/Wi_Fi.html (Links to an external site.)Links to an external site. [Accessed 10 February 2019]
    [8] "Optimizing Industrial Wi-Fi Operation in the 5 GHz Frequency Band" 2010. Available: ftp://support-datalogic.de/ADC/Mobile/Allgemein/WLAN/Summit/Dokumente/Summit_5ghzOperation_whitepaper_final.pdf (Links to an external site.)Links to an external site. [Accessed 10 February 2019]


  • 8. Shuo Chen, Danfeng Sheng, and Hongbin Lin
        (sca185 at sfu.ca, danfengs at sfu.ca, and hongbinl at sfu.ca)

    Analysis of packet loss related to transmission distance

    Abstract:
    As the era of the Internet arrives and affects people all over the world, people tend to show their increasing expectations of Internet technologies. Around 60 years ago, people were crazy about the invention of the very first general-purpose computer ENIAC. Now, people already get used to applications like video streaming and online games. People will complain about the video streaming latencies [1], slow networks [2], etc. One of the root-cause reasons is packet loss. Packet loss is the loss of data during the process of digital communication transmission. [3] The causes of the packet loss may include aspects like bandwidth, jitter, Internet connection, etc. However, one of the most common reasons is the transmission distance. People can experience huge latencies when they try to access the servers from abroad districts. For a wireless network, the packet loss is expected to increase as the increment of the distance. [4] Another study of packet loss versus distance using 802.11g wireless network illustrates that the SNIR(Signal-to-noise-interference-ratio) will dramatically decrease as distance goes up. [5] We will establish the simulation model with various protocols to examine the relationships between packet loss and transmission distance.

    References:
    [1] J. Hartman, "This Is Why Your Live Stream Lags: Intro To Live Streaming Latency," Boxcast, 01 January 2019. [Online]. Available: https://www.boxcast.com/blog/live-stream-video-latency. [Accessed 7 February 2019].
    [2] K. Daham, "Top 10 Most Common Causes for Poor Network Performance," Computer Works, 28 October 2016. [Online]. Available: http://www.cwims.com/performance/top-10-most-common-causes-for-poor-network-performance/. [Accessed 7 February 2019].
    [3] L. Rivenes, "What are the Causes of Packet Loss?," Datapath.io, 8 March 2016. [Online]. Available: https://datapath.io/resources/blog/causes-of-packet-loss/. [Accessed 7 February 2019].
    [4] C.-H. C. L.-F. L.-P. H. W.-T. H. G.-C. L. Yuan-Jen Chang, "Wireless Sensor Networks for Vital SignsMonitoring: Application in a Nursing Home," 25 December 2013. [Online]. Available: https://www.researchgate.net/publication/258386464. [Accessed 7 February 2019].
    [5] R. Hornig, "Packet Loss vs. Distance Using Various WiFi Bitrates," [Online]. Available: https://inet.omnetpp.org/docs/showcases/wireless/errorrate/doc/index.html. [Accessed 7 February 2019].


  • 9. Charles Chang, Jonathan Choy, and Brandon Shen
        (cca214 at sfu.ca, jychoy at sfu.ca, shenyis at sfu.ca)

    Simulation and Performance of LTE Networks in Remote Vehicle Driving

    Abstract:
    Remote driving of vehicles, or vehicle teleoperation, is a big topic in modern times. Being able to remotely control a vehicle or device anywhere at any time over a cellular network opens many possibilities, but there are many factors to consider first. The latency, coverage distance, transmission frequency, and data rates of a network are all important in achieving vehicle teleoperation [1]. The aim of this project is to simulate data streaming over an LTE network in an urban environment and look at the performance of the important parameters. Finally, we use those data to make a conclusion on the feasibility of vehicle teleoperation on an LTE network.

    References:
    [1] Z. H. Mir, F. Filali, "LTE and IEEE 802.11p for vehicular networking: a performance evaluation," EURASIP Journal on Wireless Communications and Networking, vol. 16, issue 21, Dec., 2014
    [2] Y. Jin, "Feasibility Study of Vehicular Teleoperation over Cellular Network in Urban Scenario," KTH Royal Institute of Technology, Stockholm, Sweden, Tech. Report. 2017.
    [3] R. Liu, D. Kwak, S. Devarakonda, K. Bekris, L. Iftode, "Investigating Remote Driving over the LTE Network," In Proc. AutomotiveUI 2017 - 9th International ACM Conference, Sep. 4, 2017, pp. 264-269.
    [4] R. Inam, N. Schrammer, K. Wang, A. Karapantelakis, L. Mokrushin, A. V. Feljan, E. Fersman, In Proc. IEEE 19th International Conference on Intelligent Transportation Systems, Nov. 2016.
    [5] L. Kang, W. Zhao, B. Qi, S. Banerjee, Augmenting Self-Driving with Remote Control: Challenges and Directions. AZ, USA, Association for Computing Machinery, 2018.


  • 10. Younghoon Jee, Sam Swerhone, and Liam O'Shaughnessy
        (yjee at sfu.ca, sswerhon at sfu.ca, and loshaugh at sfu.ca)

    Simulating MWSN with Varying Parameters

    Abstract:
    Reliable wireless ad-hoc networks are the key to large scale adoption of autonomous systems. As self-driving vehicles and autonomous robots are edging into the commercial sector, wireless ad-hoc networks have become topic of high interest within academia. Wireless ad-hoc networks (WANET) allow mobile devices to communicate with each other, affording common requirements like collision avoidance and distributed data acquisition. The key features of these non-trivial network designs are decentralization and forward routing. Mobile Wireless Sensor Networks (MWSN), will be the focus of this project [1]. A detailed analysis via ns-3 simulation will be carried out, providing insight into the MWSN design considerations.
    The report will specify how MWSNs are implemented, optimized, and determine their limitations. The scope will be limited to industrial MWSN data acquisition applications. The theme of the simulations will be data forwarding of mobile sensing robots within a contained facility. The following parameters will be varied during simulation trials: node number, facility size, and node velocities.

    References:
    [1] Mobile wireless sensor network. Wikipedia, [online document]. Available: https://en.wikipedia.org/wiki/Mobile_wireless_sensor_network (Links to an external site.)Links to an external site.. [Accessed February 9, 2019]
    [2] V. Jayalakshmi and A. Razak, “A study on issues and challenges in mobile ad hoc networks,” International Journal of Innovative Research in Computer and Communication Engineering, vol. 3, no. 9, September, 2015. [Online serial]. Available: http://www.rroij.com/open-access/a-study-on-issues-and-challenges-in-mobile-ad-hoc-networks-IJIRCCE-2015-%200309003.pdf (Links to an external site.)Links to an external site.. [Accessed February 9, 2019].
    [3] A. Winfield, “Distributed sensing and data collection via broken ad hoc wireless connected networks of mobile robots,” ResearchGate, January, 2000. [Online serial]. Available: https://www.researchgate.net/publication/221230049_Distributed_Sensing_and_Data_Collection_Via_Broken_Ad_Hoc_Wireless_Connected_Networks_of_Mobile_Robots (Links to an external site.)Links to an external site.. [Accessed February 9, 2019].
    [4] V. Ramasamy, “Mobile wireless sensor networks: an overview,” ResearchGate, October, 2017. [Online serial]. Available: https://www.researchgate.net/publication/320266947_Mobile_Wireless_Sensor_Networks_An_Overview. [Accessed February 9, 2019].
    [5] U. Burgos, U. Amozarrain, C. Gómez-Calzado and A. Lafuente, “Routing in mobile wireless sensor networks: a leader-based approach,” MDPI, July, 2017. [Online serial]. Available: https://www.mdpi.com/1424-8220/17/7/1587/pdf. [Accessed February 9, 2019].
    [6] C. Han, Y. Yang and X. Han, “A fast network coding scheme for mobile wireless sensor networks,” International Journal of Distributed Sensor Networks, February, 2017. [Online serial]. Available: https://journals.sagepub.com/doi/full/10.1177/1550147717693241. [Accessed February 9, 2019].


  • 11. Wong Yau Shing, Junchen (Steven) Wang, and Wang Xi
        (wongyauw at sfu.ca, junchenw at sfu.ca, and axi at sfu.ca)

    WiFi Network Design for Public Transportation System

    Abstract:
    A WiFi hotspot aims to provide a physical address to users so that they can access to the Internet with their devices outside their home. In the past 10 years, these hotspots services have become very popular in different fields, such as coffee shops, mall, hotel and airport. In some cities, people can also use hotspots even in public station and parks. This makes wireless access becomes very convenient, as long as people can find a security hotspot that gives them a strong enough connection signal. Nowadays, finding a good quality hotspot is as simple as doing a web search. In addition, some Internet provider may also provide hotspots in public area, like ShawOpen and Telus hotspot.
    There are mainly two ways to get a WiFi access from a hotspot in public. The first one is a free WiFi provided by merchants, such as mall, restaurants or hotel wireless service for their guests. Of course, some of them are not completely free. These vendors may limit the bandwidth of each user, which will slow down the visiting speed. The second way is the Portable WiFi hotspot. If people want to use a hotspot anywhere they expect, they can bring a portable WiFi hotspot. A portable WiFi hotspot allows people to access to the Internet through a build-in mobile router which can be used to connect several devices at the same time without downloading any additional software. However, people need to carry an extra device that needs to be recharged which reducing the convenience. Still, portable WiFi will ensure that people can get a network connection where public hotspots are not available.
    The purpose of this project is providing Wireless Network service at bus station and on the bus. By setting up multiple routers in the stations and on the bus to send signal for free connection. This will be a great innovation for people cutting their free time when waiting the bus or taking a long distance (terminus-to-terminus) travel on the bus.

    References:
    [1] David, Bertrand & Chalon, Rene. (2010). Hotspot Based Mobile Web Communication and Cooperation: ABRI+ Bus Shelter as a Hotspot for Mobile Contextual Transportation and Social Collaboration. 184-189.
    [2] R. P. Folkes and L. A. Visser, "PROTOCOL COMMUNICATION AND OTHER PUBLICATIONS TRANSIT PACKET FORWARDING ROUTED BETWEEN MULTIPLE VIRTUAL ROUTERS WITHNA SINGLE PHYSICAL ROUTER", 24-Apr-2007.
    [3] P. J. Pepperell, A. D. Cambridge, C. M. Spencer, R. F. Concord, and P. S. Commerford, "SYSTEM AND METHOD FOR ASSISTING IN CONTROLLING REAL-TIME TRANSPORT PROTOCOL FLOW THROUGH MULTIPLE NETWORKS VLAUSE OF ACLUSTER OF SESSION ROUTERS", 21-Feb-2006.
    [4] ns-3: ns3::MinstrelHtWifiManager Class Reference. [Online]. Available: https://www.nsnam.org/doxygen/wifi-trans-example_8cc.html [Accessed: 17-Feb-2019].
    [5] ns-3: ns3::Building a Wireless Network Topology. [Online]. Available: https://www.nsnam.org/docs/release/3.7/tutorial/tutorial_27.html [Accessed: 17-Feb-2019].


  • 12. Saad Alkhalifah and Mika Kanemitsu
        (salkhali at sfu.ca and mkanemit at sfu.ca)

    Enhance a Network Security Using VLAN, Port Security and Access Control List

    Abstract:
    Building a secure network is very complex as many malware could threaten network devices. To mitigate such threats there are several techniques and measures can be deployed in the network. This project concentrates on a switch security and examines all possible methods to prevent any damages to connected devices. Moreover, virtual local area network (VLAN), access control list (ACL) and port security will be configured on a switch to analyze its performance and results. The project will be simulated using Cisco software “Packet Tracer” version 7.2.1.

    References:
    [1] A. Buhr, D. Lindskog, P. Zavarsky and R. Ruh, "Media Access Control Address Spoofing Attacks against Port Security." Available: https://www.usenix.org/legacy/event/woot11/tech/final_files/Buhr.pdf. [Accessed 9 February 2019].
    [2] "Configuring Port Security", Cisco.com, 2019. [Online]. Available: https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/port_sec.pdf. [Accessed: 09- Feb- 2019].
    [3] K. Maddipatla and S. Agarwal, "Limiting Traffic on Local Area Networks through Switch Port Security", vol. 5, no. 8, 2015. Available: http://ijarcsse.com/Before_August_2017/docs/papers/Volume_5/8_August2015/V5I8-0292.pdf. [Accessed 9 February 2019].
    [4] "RFC 3488 - Cisco Systems Router-port Group Management Protocol (RGMP)", Tools.ietf.org, 2003. [Online]. Available: https://tools.ietf.org/html/rfc3488. [Accessed: 09- Feb- 2019].
    [5] A. Raihan and M. Afroze, "SECURING A NETWORK BY USING VLAN, PORT SECURITY AND ACCESS CONTROL LIST", Dspace.ewubd.edu, 2016. [Online]. Available: http://dspace.ewubd.edu/bitstream/handle/123456789/2187/Md._Asif_Raihan.pdf?sequence=1&isAllowed=y. [Accessed: 09- Feb- 2019].


  • 13. Yagnik Vadher and Vanshaj Kochar
        (yvadher at sfu.ca and vkochar at sfu.ca)

    Analysis of LoRaWAN for connected devices (IoT)

    Abstract:
    In today's era, the Internet of things has become vital for the betterment of human lives. While the number of connected devices(IoT) continues to rise (and is expected to reach 125 billion by 2030), fascinating technologies will continue to develop [2]. From devices that monitor home security to devices that monitor person health, alert users relatives in real time, IoT has picked up a strong growth line and is continued to be expanded globally. Most of the IoT solutions needs two major things. Low power usage and High range to communicate. With solutions like wifi, BLE, Zigbee, LTE and others, which have major drawback towards IoT [1]. Therefore, there needs to be a solution which provides low powered and long-range communication which is just right for IoT connected devices. There exist a couple of technologies such as LoRaWAN, NB-IoT, Sigfox and LTE-M. All of them are tailored specifically towards IoT business models but some of them have a wide scope of usage such as LoRaWAN.
    Low-Power Wide Area Network (LPWAN) supports long-range communication for hundreds to millions of smart devices and enables new types of services in the Internet of Things (IoT) context [3]. There are some known security vulnerabilities in LoRaWAN that lead to the proposal of several improvements and some of them were incorporated [4]. This project aims to deliver a complete analysis of LoRaWAN with security specification, major strength and weakness using a network simulator.

    References:
    [1] "RF Wireless World," modulation index in AM and FM | What is modulation index. [Online]. Available: http://www.rfwireless-world.com/Terminology/Advantages-and-Disadvantages-of-NB-IoT.html. [Accessed: 10-Feb-2019].
    [2] B. Ray, "NB-IoT vs. LoRa vs. Sigfox," Link Labs, 25-Jun-2018. [Online]. Available: https://www.link-labs.com/blog/nb-iot-vs-lora-vs-sigfox. [Accessed: 10-Feb-2019].
    [3] K. Phung, H. Tran, Q. Nguyen, T. T. Huong and T. Nguyen, "Analysis and assessment of LoRaWAN," 2018 2nd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Ho Chi Minh City, 2018, pp. 241-246.doi: 10.1109/SIGTELCOM.2018.8325799
    [4] M. Eldefrawy, I. Butun, N. Pereira, and M. Gidlund, "Formal security analysis of LoRaWAN," Computer Networks, vol. 148, pp. 328–339, 2019.
    [5] A. Augustin, J. Yi, T. Clausen, and W. Townsley, "A Study of LoRa: Long Range & Low Power Networks for the Internet of Things," Sensors, vol. 16, no. 9, p. 1466, 2016.


  • 14. Xinwei Zhang and Abbas Raza
        (xinweizat sfu.ca and abbasr at sfu.ca)

    Gaming with WiFi

    Abstract:
    We are interested in looking into gaming that is done over Wi-Fi networks. The project will be mainly done on Riverbed Modeler using Object Palette where virtual Wi-Fi network will be manually simulated. Trails will be mimicked where Clients like mobile devices, computers and other routers will request for packets that contain gaming data. Every trial will have a different number of clients that will send packet requests to the central server/router. The server in return depending on the number of clients will respond by sending the packet. Different trails will show us the congestion problem and how server responds to clients in case of congestion. This can be done by comparison between the results of each trail simulation results. This project will use UDP services to do this transaction as gaming can be loss-tolerant. Thus, UDP will serve as an efficient protocol. IEEE 802.11 standard will be set for the system. It will cover the delay and tracing of Data traffic going in and out of the main router. Secondly and most importantly there will be a case study about trajectory where if the client will move away from the router how will it affect the data transfer.

    References:
    [1] Bin Liu (Links to an external site.)Links to an external site., Qi Zhu (Links to an external site.)Links to an external site., Weiqiang Tan (Links to an external site.)Links to an external site., and Hongbo Zhu (Links to an external site.)Links to an external site., “Congestion-Optimal WiFi Offloading with User Mobility Management in Smart Communications”, 1 August 2018 [Online]. Available: https://www.hindawi.com/journals/wcmc/2018/9297536/
    [2] Brady Borrmann, Francis Tran, Martin Leung, "Analysis of Simulated WiFi Network," ENSC427 Communication Network, Burnaby, 2017.
    [3] J. F. Kurose, K. W. Ross, Computer Networking: A Top-Down Approach, Pearson, 2017.
    [4] C.-H. H. M. H. Cong Ly, "IRS: A Detour Routing System to Improve Quality of Online Games," 14 February 2011. [Online]. Available: http://ieeexplore.ieee.org.proxy.lib.sfu.ca/document/5713259/?reload=true. [Accessed 8 February 2018].
    [5] S. S. Dewan Tanvir Ahmed, "Improving online gaming experience using location awareness and interaction details," 13 January 2011. [Online]. Available: https://sfu-primo.hosted.exlibrisgroup.com/primo-explore/fulldisplay (Links to an external site.)Links to an external site.?


    Last modified: Sun Mar 10 00:19:35 PST 2019.