| ENSC 427: Communication Networks |
| Spring 2019 |
| Last update:
February 10, 2019 |
| No. |
Names (Last, First) |
Student PDF Name |
Email |
Proposed project titles |
| 1 |
Azhar, Shahira Afrin |
Shahira |
shahiraa at sfu.ca |
1. Comparing the measurement of quality of experience (QoE)
for audio streaming services on a WiFi |
|
Dupouy, Ricardo Jose |
Ricardo |
rdupouy at sfu.ca |
network versus video
streaming services |
|
Qumsieh, Robin |
Robin |
rqumsieh at sfu.ca |
2. Measuring the quality of experience (QoE) for spotify on
wifi network (SFU) vs LTE or 3G |
| |
|
|
|
|
| 2 |
Batke, Nathan Riley |
Nathan |
nbatke at sfu.ca |
1. Case study of Netflix CDN |
|
Xu, Ruo Han |
Peter |
peterx at sfu.ca |
2. Reflection and amplification DDoS attacks |
|
Yun, Victor Chun-Bon |
Victor |
vyun at sfu.ca |
3. Analysis of 2.4GHz and 5GHz WiFi performance over varying
distance |
| |
|
|
|
|
| 3 |
Chen, Cheng |
Cheng |
cca175 at sfu.ca |
1. Simulation of sniffer detection with the source-route
method |
|
Chung, Sheung Yau |
Sheung Yau |
sychung at sfu.ca |
2. Analysis of the latency approach to promiscuous nodes
detection |
|
You, Tao |
Tao |
tyou at sfu.ca |
|
| |
|
|
|
|
| 4 |
Lai, Carson Ka Sing |
Carson |
ckl41 at sfu.ca |
1. Cheating in online games through deep network packet
inspection |
|
Macanlalay, Princess Krizia Torio |
Princess |
pmacanla at sfu.ca |
2. Gaming through different transmission media (Fibre,
Ethernet, Wifi, LTE) |
| |
|
|
|
|
| 5 |
Kwok, Eric Jan-Wei |
Eric |
eka34 at sfu.ca |
1. Simulation of key reinstallation (KRACK) attack |
|
Lee, Derrick Ga-Hao |
Derrick |
dgl3 at sfu.ca |
2. Simulation of onion routing protocol (Tor) |
|
Yee, Duncan Fung-Jik |
Duncan |
duncany at sfu.ca |
|
| |
|
|
|
|
| 6 |
Bin, Xue Qing |
Molly |
mbin at sfu.ca |
1. Analyzation of gaming using peer to peer paradigm |
|
Li, PengCheng |
Liam |
pla68 at sfu.ca |
|
|
Xiao, Jia Hui |
Mandy |
mandyx at sfu.ca |
|
| |
|
|
|
|
| 7 |
Aoki, Justin Kenta |
Justin |
jkaoki at sfu.ca |
1. Comparing the performance bewteen 2.4G and 5G networks |
|
Corbett, Kevin Edward |
Kevin |
kecorbet at sfu.ca |
2. Information flow between a videogame streamer and user
watching on computer/smartphone |
|
de Guzman, Jonathan Andrew Dizon |
Jon |
jdeguzma at sfu.ca |
|
| |
|
|
|
|
| 8 |
Chen, Shuo |
Ricky |
sca185 at sfu.ca |
1. Analysis of packet loss related to transmission distance
and number of clients |
|
Lin, Hongbin |
Hongbin |
hongbinl at sfu.ca |
|
|
Sheng, Danfeng |
Danfeng |
danfengs at sfu.ca |
|
| |
|
|
|
|
| 9 |
Chang, Charles |
Charles |
cca214 at sfu.ca |
1. LTE capabilities for remote driver of vehicles |
|
Choy, Jonathan Ying-Fei |
Jonathan |
jychoy at sfu.ca |
2. Video streaming quality over multiple lte base stations
during handover or low signal area |
|
Shen, Yi Shu |
Brandon |
shenyis at sfu.ca |
|
| |
|
|
|
|
| 10 |
Jee, Younghoon |
Younghoon |
yjee at sfu.ca |
1. Simulating a wireless ad-hoc network with a varying number
of mobile nodes |
|
O'Shaughnessy, Liam |
Liam |
loshaugh at sfu.ca |
2. TCP performance in an Enhanced General Packet Radio Service
(EGPRS) |
|
Swerhone, Samuel John |
Sam |
sswerhon at sfu.ca |
|
| |
|
|
|
|
| 11 |
Wang, Junchen |
Steven |
junchenw at sfu.ca |
1. Bus station wifi simulation using ns-3 model |
|
Wong, Yau Shing |
Yau Shing |
wongyauw at sfu.ca |
2. Torrents simulation of downloading a movie |
|
Xi, Wang |
Hope |
axi at sfu.ca |
|
| |
|
|
|
|
| 12 |
Alkhalifah, Saad Khalid S |
Saad |
salkhali at sfu.ca |
1. Analyzing routing decisions in a network using different
type of routers (RIP, OSPF,EIGRP) |
|
Kanemitsu, Mika |
Mika |
mkanemit at sfu.ca |
2. Build and configure medium size network using Cisco
software “Packet Tracer” |
|
Raza, Abbas |
Abbas |
abbasr at sfu.ca |
3. Perform exclusive operations on port security violations in
a switch and provide a solution for each violation |
| |
|
|
|
|
| 13 |
Kochar, Vanshaj |
Vansh |
vkochar at sfu.ca |
1. LoRaWAN network simulation |
|
Vadher, Yagnik Jethabhai |
Yagnik |
yvadher at sfu.ca |
|
| |
|
|
|
|
| 14 |
Zhang, Xinwei |
Xinwei |
xinweiz at sfu.ca |
1. DoS Attack |
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|