Capstone Projects & Reports (Master of Science in Internetworking (MINT))
Contains capstone projects and related materials submitted by graduates of the Master of Science in Internetworking (MINT) program.
Items in this Collection
- 35Noonari, Juned (Supervisor)
- 32MacGregor, Mike (Supervisor)
- 13Rogers, Leonard (Supervisor)
- 10Nanda, Gurpreet (Supervisor)
- 9Kaur, Sandeep (Supervisor)
- 7MacGregor, Mike (Advisor)
- 21Cloud computing
- 18Computer networks
- 14Computer network protocols
- 14Computer security
- 12Internet of things
- 11Software-defined networking (Computer network technology)
-
2006-07-01
The successful deployment of UMTS (Universal Mobile Telecommunication System) Cellular Network is heavily dependent on CAC (Call Admission Control) which plays a major role in ensuring QoS (Quality of Service) to be achieved. This report is based on the investigation of CAC (Call Admission...
-
An MPLS VPN Network Designed for the Edmonton Capital Region: Theory, Case study and Lab Implementation
Download2016-03-09
The technology of MPLS has been around for many years and has taken the world by storm. It has become extremely popular in a relatively short period of time. The major benefits of using an MPLS framework in your network are the ability to use one unified networking core, better IP over ATM...
-
2018-03-01
Rapid urbanization, the population density and the increase in the consumption demand are required to be effectively managed to meet the necessity of the era. The conception of a smart city is a participatory and sustainable vision of urban development aimed at building an effective city...
-
2018-03-01
The world is progressing, and new advancements are developed in mobile networks very rapidly. High-speed internet, higher data rates and quality of service are now heavily in demand; people are now constantly on their electronic devices. 5G is the proposed next telecommunications standards beyond...
-
Analysis of Artificial Intelligence Techniques to Detect, Prevent, Analyze and Respond to Malware
Download2023-04-01
Malware has been posing a significant problem to almost every organization. Every organization online and every user using the services of the internet is susceptible to attacks. The preparators of these attacks are humans; malware is the tool they use to exploit the systems. The “malicious”...
-
2020-09-01
In this technological world, data leakage poses a severe threat to every organization as well as to individuals. Every day, a new data leak or a data breach is happening, and the number of data leaks is increasing continuously, resulting in the rise in the cost of handling a data leak. Whether...
-
2021-10-01
The main objective of this project is to study and analyse about the Ransomware malware and its types, attacking vectors, prevention techniques and analysed the system behaviour when infected with Ransomware and implemented basic recovery techniques of infected system. Ransomware is a malware...
-
2020-01-01
Introduction to Blockchain: History - The concept of Blockchain was introduced to the world with the invention of bitcoin in 2018. Bitcoin started its practical implementation in 2019. It was built on decades of research on cryptography, digital cash, decentralization and distributed computing....
-
2013-01-01
Narayanaguru, Rangith Ravindran
Introduction: Cloud computing has become one of the most exciting and rapidly growing technologies in the IT field. Cloud computing is typically the use of computing resources like networks, servers, storage, applications and services shared among number of end users over a network. Cloud service...
-
2021-01-01
Automated hacking is a modern approach to conduct computer hacking with a significantly higher performance rate directly or remotely. Automated hacking is carried out by computer programs that are programmed to analyze the vulnerability of a system(s) and carry out hacking attacks based on the...