Capstone Projects & Reports (Master of Science in Internetworking (MINT))
Contains capstone projects and related materials submitted by graduates of the Master of Science in Internetworking (MINT) program.
Items in this Collection
- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
2021-09-29
The increased demand in the market for mobility and flexibility in our everyday life has lead to the advancement from Wired LANS to Wireless LANS. The Wireless local area networks (WLANs) has received a huge boost in recent times due to advancements in portable devices such as PDAs, cellular...
-
2022-03-24
Traditional enterprise networking requires lots of manual operation, such as manual troubleshooting, configuration, monitoring and analysis. Especially for large enterprises, which might have hundreds or even thousands of sites, the labor cost of manual operation is exceptionally high, and the...
-
2023-04-01
With the rapid development of Connected and Autonomous Vehicles (CAVs), critical challenges appear as well. Cybersecurity in CAVs is one of the most significant issues in the upcoming decades. This is a capstone project report for the MINT program essentially aims to solve Control Area Network...
-
2022-03-26
Cyber security is an application of technologies that provides secured networks, protects data from unauthorized access, and makes resources available only to authorized personnel [1]. In today’s world, data is the new oil. The Internet plays a crucial role in data exchange, not just limited to...
-
2023-04-01
I want to thank my mentor, Mr.Jonathon Baddock, for providing me with guidance & support throughout the project, which helped me to complete my project on time. Also, I would like to express my appreciation to my colleagues, who provided me with valuable insights throughout the project. I owe my...
-
2023-04-01
The suggested idea Key loggers, also known as keystroke loggers, are products that record or track the keys you press on your console, frequently secretly so that you are unaware that your actions are being monitored. Most people prefer to just see the negative aspects of this programme, but it...
-
An Analysis of Network Convergence Time Between IPv4 Routing Protocols; RIP, EIGRP, OSPF, and their IPv6 Equivalents
Download2014-01-01
As IPv4 is nearing the end of its ability to meet the needs of the growing network community, IPv6 has been selected as the protocol which will meet the demands of future network growth. Every new technology brings about a period of uncertainty as businesses, operators, and users transition from...
-
2022-03-01
Abstract: Cryptocurrency has emerged as one of the widely used applications based on Blockchain. This report intends to provide an overview of Cryptocurrency, Blockchain, Cryptographic hashing, Public key encryption and Quantum computer subjects. The report will touch upon various technologies...
-
2023-04-01
The Global Position System (GPS) does ensure that we get different services, including weather, time, and location. The global position System is widely used as it provides services to consumer applications and the commercial military. As GPS users, we are privileged to understand and know our...
-
2021-11-04
“Virtualization means that Applications can use a resource without any concern for where it resides, what the technical interface is, how it has been implemented, which platform it uses, and how much of it is available.” [1] There are many motivations why we need to use virtualization for each...