| ENSC 427: Communication Networks |
|
| Spring 2026 |
|
| Last update: March
14, 2026 |
|
| No. |
Names (Last, First) |
Email |
Proposed project titles |
Color |
|
| 1 |
Dervishaj, Ilirijan |
idervish |
Comparing TCP vs. UDP performance |
|
|
|
Park, Jasmine |
jhp18 |
Testing and Comparing Anomaly Detection Between TCP and UDP |
|
|
|
|
|
Compare BBR vs. CUBIC Congestion Control Protocols |
|
|
| |
|
|
|
|
|
| 2 |
Kanthawala, Husain Mustafa |
hmk7 |
Source Address Validation Improvements (SAVI) in ns-3 |
|
|
|
Kjellbotn, Duncan |
dkk5 |
Improving Network Resilience Under DHCP Failures Using Static
Fallback IP Assignment |
|
|
| |
|
|
|
|
|
| 3 |
Dong, Wenxi |
wda21 |
Detecting UDP Port Forwarding via a Bandwidth-Based Heuristic
Approach |
|
|
|
Preradovic, Drew |
dpa55 |
Exploring the Performance of TCP-based VPN Protocols |
|
|
|
|
|
Characterizing Elliptic Curve Diffie Hellman-based Denial of
Service Attacks |
|
|
| |
|
|
|
|
|
| 4 |
Kramer, Karina |
kkramer |
CAN Transceiver Implementation on FPGA |
|
|
|
Zhu, Eva |
eza10 |
Snake MMO |
|
|
| |
|
|
|
|
|
| 5 |
Durston, Madison |
mld16 |
Performance and Scalability of Enterprise VPN Infrastructure
Using ns-3 |
|
|
|
McEvoy, Arden |
agm13 |
Low Earth Orbit Satellite Handover Effects on Data Streams |
|
|
| |
|
|
|
|
|
| 6 |
Leung, Bryce |
bla135 |
A Study of Man-in-the-Middle (MitM) Behavior Using ns-3
Simulation and Embedded Hardware |
|
|
|
Mousa, Felo |
fgm3 |
|
|
|
|
Singh, Sahaj |
ssa365 |
|
|
|
| |
|
|
|
|
|
| 7 |
Kuboki, Eita |
eka57 |
5G vs. LTE: Security Comparison |
|
|
|
Shapiro, Allen |
asa486 |
5G vs. 6G: is 6G Secure by
Design? |
|
|
|
|
|
Network Slicing in 5G–Security
Challenges |
|
|
|
|
|
Mitigating Collateral Damage and Protecting Capacity During
Volume-Based DDoS Attacks |
|
|
| |
|
|
|
|
|
| 8 |
Epstein, Rose |
rea13 |
Assessing the Effects of
Deauthentication Attacks and the Role of Protected Management Frames (PMFs)
in Securing Public Wi‑Fi |
|
|
|
Kitsa, Prisca |
pnk2 |
Assessing the Effectiveness of
Media Access Control (MAC) Address Randomization Against Passive Tracking in
Public Wi‑Fi |
|
|
| |
|
|
|
|
|
| 9 |
Huang, Curtis |
cha154 |
Goodput Analysis of UDP-Based
Video Transmission in a Wired Network |
|
|
|
Nguyen, Duc Minh Quang |
dmn3 |
Analysis of DDoS Attack on
Network Performance |
|
|
| |
|
|
|
|
|
| 10 |
Amanuel, Simon |
samanuel |
Comparative Analysis of Congestion Control Algorithms in
High-Speed Data Center Networks |
|
|
|
Irvin, Syed |
sai3 |
Mitigating DDoS Attacks in Software-Defined Networking (SDN)
using Machine Learning |
|
|
|
|
|
Performance Evaluation of QUIC vs. HTTP/2 in Challenged
Wireless Environments |
|
|
| |
|
|
|
|
|
| 11 |
Chung, Denzil |
dca145 |
Handover Optimization for High-Speed Trains |
|
|
|
Ng, Emily |
ena23 |
Analysis of Algorithms Improving QoS of Real-Time
Telecommunication (WebRTC) |
|
|
| |
|
|
|
|
|
| 12 |
Malik, Wajihah |
wma29 |
A Comparative Analysis of the Differences Between Volumetric
Attacks and Packet-Rate Attacks, and their Detection Signatures |
|
|
|
Mohsen, Maryam |
mma286 |
|
|
|
| |
|
|
|
|
|
| 13 |
Malhi, Parmvir |
psm7 |
Performance of TCP and UDP Under DDoS in a WiFi Network |
|
|
|
|
|
Impact of Router Queuing Algorithms on IoT Network Performance |
|
|
|
|
|
QoE Analysis of Video Streaming Over WiFi Under Network
Congestion |
|
|
| |
|
|
|
|
|
| 14 |
Weng, Clinton |
cwa23 |
Analyzing Transport Protocol Performance with Scaling Sensor
Data Loads |
|
|
|
Zhu, Leon |
jcz3 |
|
|
|
| |
|
|
|
|
|
| 15 |
Blanco, Michael |
mba202 |
Performance Evaluation of Transmission Control Protocol (TCP)
Congestion Control Algorithms in High-Delay Satellite Networks |
|
|
|
Mangat, Gurkamal Kaur |
gkm6 |
UDP vs. TCP for Real-Time Traffic |
|
|
|
|
|
Comparative Analysis of AODV (Ad-Hoc On-Demand Distance
Vector) and OLSR (Optimized Link State Routing) Protocols in Vehicular Ad-Hoc
Networks (VANETs) |
|
|
|
|
|
IoT Network Scalability Under Congestion |
|
|
| |
|
|
|
|
|
| 16 |
Phan, Tu |
tpa38 |
Network Security: Attack Modeling and Defense Mechanisms |
|
|
|
Schulz, Armin |
asa319 |
Threat Analysis: A Deeper Dive into Modern Internet Attacks |
|
|
| |
|
|
|
|
|
| 17 |
Kremler, Noah |
nka71 |
CAN Bus Security Analysis |
|
|
|
Nurzhigitov, Aitu |
ana107 |
|
|
|
| |
|
|
|
|
|
| 18 |
Ng, Matt |
myn3 |
Machine Learning Techniques for Classifying Network Anomalies
and Intrusions |
|
|
|
Rana, Kesley |
kesleyr |
TCP Capability in Handling Disturbances in Real-Time
Industrial Applications (PLC System) by Simulating Scheduled Link Impairments
and Evaluating TCP Control Recovery Time |
|
|
|
|
|
TCP Variants (Throughput, Delay, Packet loss, Fairness, and
Congestion Evaluation) to Study the Effect on Wi‑Fi (Wireless) and
Point-to-Point (Wired) Networks |
|
|
| |
|
|
|
|
|
| 19 |
Alanes, John |
jpa18 |
Simulation of DDoS Attacks on Real-Time Gaming Traffic and
Quality of Service |
|
|
|
Phan, Ethan |
epa25 |
Starlink Performance in Urban vs. Rural Areas |
|
|
| |
|
|
|
|
|
| 20 |
Luo, Tom |
fla73 |
Evaluating and Analyzing the Impact of Background Traffic on
Real-Time Applications in Wireless Networks Using ns-3 |
|
|
|
Wang, Jack |
ywa419 |
|
|
|
| |
|
|
|
|
|
| 21 |
Huang, Evan |
eha65 |
Create a Comparative Performance Analysis of Wi‑Fi 7
(802.11be) in ns-3 |
|
|
|
Shehada, Yousif |
ysa249 |
The Three Congestion Control Techniques that this Project
Evaluates are TCP Reno, TCP Cubic, and Google BBR |
|
|
| |
|
|
|
|
|
| 22 |
Manco, Bora |
bma107 |
Comparative Quality of Experience Analysis of Real-Time Voice
and Video Traffic Under Bandwidth Constraints |
|
|
| |
|
|
|
|
|
| 23 |
Bors, Vlad |
vab3 |
A Machine Learning Approach to Detecting Low-Rate DDoS |
|
|
|
|
|
Indoor Localization Using WiFi Signal Fingerprinting |
|
|
|
|
|
Detection of Covert Timing Channels in Network Traffic |
|
|
| |
|
|
|
|
|
| 24 |
Su, Alex |
ysa174 |
AODV vs. DSDV Performance in Mobile Ad Hoc Networks |
|
|
| |
|
|
|
|
|
| 25 |
Qadri, Qiraa |
qqa1 |
How does application-layer burstiness affect downstream queue
stability and tail latency under fixed average load? |
|
|
|
Silva, Aura |
ans9 |
How do network-induced delay, jitter, and packet loss affect
the convergence time and steady-state accuracy of distributed clock
synchronization over packet-switched networks? |
|
|
|
|
|
How does TCP congestion control adapt its congestion window
and transmission behavior as network congestion develops and subsequently
resolves in a bottlenecked packet-switched network? |
|
|
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|