ENSC 427: Communication Networks
Spring 2026
Last update: March 14, 2026
No. Names (Last, First) Email Proposed project titles Color
1 Dervishaj, Ilirijan idervish Comparing TCP vs. UDP performance  
Park, Jasmine jhp18 Testing and Comparing Anomaly Detection Between TCP and UDP  
Compare BBR vs. CUBIC Congestion Control Protocols  
         
2 Kanthawala, Husain Mustafa hmk7 Source Address Validation Improvements (SAVI) in ns-3  
Kjellbotn, Duncan dkk5 Improving Network Resilience Under DHCP Failures Using Static Fallback IP Assignment  
         
3 Dong, Wenxi wda21 Detecting UDP Port Forwarding via a Bandwidth-Based Heuristic Approach  
Preradovic, Drew dpa55 Exploring the Performance of TCP-based VPN Protocols  
Characterizing Elliptic Curve Diffie Hellman-based Denial of Service Attacks  
         
4 Kramer, Karina kkramer CAN Transceiver Implementation on FPGA  
Zhu, Eva eza10 Snake MMO  
         
5 Durston, Madison mld16 Performance and Scalability of Enterprise VPN Infrastructure Using ns-3  
McEvoy, Arden agm13 Low Earth Orbit Satellite Handover Effects on Data Streams  
         
6 Leung, Bryce bla135 A Study of Man-in-the-Middle (MitM) Behavior Using ns-3 Simulation and Embedded Hardware  
Mousa, Felo fgm3    
Singh, Sahaj ssa365    
         
7 Kuboki, Eita eka57 5G vs. LTE: Security Comparison  
Shapiro, Allen asa486 5G vs. 6G: is 6G Secure by Design?  
Network Slicing in 5G–Security Challenges  
Mitigating Collateral Damage and Protecting Capacity During Volume-Based DDoS Attacks  
         
8 Epstein, Rose rea13 Assessing the Effects of Deauthentication Attacks and the Role of Protected Management Frames (PMFs) in Securing Public Wi‑Fi  
Kitsa, Prisca pnk2 Assessing the Effectiveness of Media Access Control (MAC) Address Randomization Against Passive Tracking in Public Wi‑Fi  
         
9 Huang, Curtis cha154 Goodput Analysis of UDP-Based Video Transmission in a Wired Network  
Nguyen, Duc Minh Quang dmn3 Analysis of DDoS Attack on Network Performance  
         
10 Amanuel, Simon samanuel Comparative Analysis of Congestion Control Algorithms in High-Speed Data Center Networks  
Irvin, Syed sai3 Mitigating DDoS Attacks in Software-Defined Networking (SDN) using Machine Learning  
Performance Evaluation of QUIC vs. HTTP/2 in Challenged Wireless Environments  
         
11 Chung, Denzil dca145 Handover Optimization for High-Speed Trains  
Ng, Emily ena23 Analysis of Algorithms Improving QoS of Real-Time Telecommunication (WebRTC)  
         
12 Malik, Wajihah wma29 A Comparative Analysis of the Differences Between Volumetric Attacks and Packet-Rate Attacks, and their Detection Signatures  
Mohsen, Maryam mma286    
         
13 Malhi, Parmvir psm7 Performance of TCP and UDP Under DDoS in a WiFi Network  
Impact of Router Queuing Algorithms on IoT Network Performance  
QoE Analysis of Video Streaming Over WiFi Under Network Congestion  
         
14 Weng, Clinton cwa23 Analyzing Transport Protocol Performance with Scaling Sensor Data Loads  
Zhu, Leon jcz3    
         
15 Blanco, Michael mba202 Performance Evaluation of Transmission Control Protocol (TCP) Congestion Control Algorithms in High-Delay Satellite Networks  
Mangat, Gurkamal Kaur gkm6 UDP vs. TCP for Real-Time Traffic  
Comparative Analysis of AODV (Ad-Hoc On-Demand Distance Vector) and OLSR (Optimized Link State Routing) Protocols in Vehicular Ad-Hoc Networks (VANETs)  
IoT Network Scalability Under Congestion  
         
16 Phan, Tu tpa38 Network Security: Attack Modeling and Defense Mechanisms  
Schulz, Armin asa319 Threat Analysis: A Deeper Dive into Modern Internet Attacks  
         
17 Kremler, Noah nka71 CAN Bus Security Analysis  
Nurzhigitov, Aitu ana107    
         
18 Ng, Matt myn3 Machine Learning Techniques for Classifying Network Anomalies and Intrusions  
Rana, Kesley kesleyr TCP Capability in Handling Disturbances in Real-Time Industrial Applications (PLC System) by Simulating Scheduled Link Impairments and Evaluating TCP Control Recovery Time  
TCP Variants (Throughput, Delay, Packet loss, Fairness, and Congestion Evaluation) to Study the Effect on Wi‑Fi (Wireless) and Point-to-Point (Wired) Networks  
         
19 Alanes, John jpa18 Simulation of DDoS Attacks on Real-Time Gaming Traffic and Quality of Service  
Phan, Ethan epa25 Starlink Performance in Urban vs. Rural Areas  
         
20 Luo, Tom fla73 Evaluating and Analyzing the Impact of Background Traffic on Real-Time Applications in Wireless Networks Using ns-3  
Wang, Jack ywa419    
         
21 Huang, Evan eha65 Create a Comparative Performance Analysis of Wi‑Fi 7 (802.11be) in ns-3  
Shehada, Yousif ysa249 The Three Congestion Control Techniques that this Project Evaluates are TCP Reno, TCP Cubic, and Google BBR  
         
22 Manco, Bora bma107 Comparative Quality of Experience Analysis of Real-Time Voice and Video Traffic Under Bandwidth Constraints  
         
23 Bors, Vlad vab3 A Machine Learning Approach to Detecting Low-Rate DDoS  
Indoor Localization Using WiFi Signal Fingerprinting  
Detection of Covert Timing Channels in Network Traffic  
         
24 Su, Alex ysa174 AODV vs. DSDV Performance in Mobile Ad Hoc Networks  
         
25 Qadri, Qiraa qqa1 How does application-layer burstiness affect downstream queue stability and tail latency under fixed average load?  
Silva, Aura ans9 How do network-induced delay, jitter, and packet loss affect the convergence time and steady-state accuracy of distributed clock synchronization over packet-switched networks?  
How does TCP congestion control adapt its congestion window and transmission behavior as network congestion develops and subsequently resolves in a bottlenecked packet-switched network?