Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Elements that must be included in the 2 or 3-page project proposal draft:

• Title
• Motivation:
• Why you think this topic is important? why is this a significant area of research? What are the main problems in this area? and why do you think your proposal is important for the topic?
• Related Work:
• What other researchers have proposed earlier to address the above problems? What were their results and conclusions? Why you think you still need to do work in this area (i.e., what are the shortcomings/pitfalls of earlier work?) What do you propose that is different from related work? and what do you propose that is similar? Clarify how your ideas address the shortcomings of earlier work. Provide adequate and proper citations of related work.
• Proposal Body:
• Problem statement:
• State very clearly and very specifically the question(s) that you attempt to answer (Be as clear and as specific as you can). You can list the questions but add an introduction sentence to link the questions and tell the whole story.
• Evaluation metrics:
• Mention very clearly and as specific as possible the evaluation criteria and metrics you intend to use to evaluate your approach and ideas. Examples of evaluation metric may include 'overhead' (need to clarify what overhead is and how is it measured), response delay (how to measure it), etc.
• Investigated Parameter Space:
• Mention the design space investigated in the study. For example, a popularity threshold of 5-50 with steps of 5 could be a design space investigated for the SDS promotion scheme. Another example may be random selection of contacts, selection based on stability measures (need to define what stability is and what are the limits investigate1d).
• Methodology:
• Graph theory, finite state machines, queueing theory, network simulation, mathematical modeling or experimentation are some examples of the methodology. Mention which of the methodologies will be used and why. Elaborate on the tool used, if any. For example, network simulator (NS-2) or GlomoSim may be used as network simulators. Also, elaborate on the existing capabilities of the tools and what needs to be modified or augmented to suit your analysis.
• Scenarios:
• Include topologies (network size, connectivity, etc.), traffic and multicast membership patterns (if any), network failures, packet loss patterns, mobility models/degrees that will be used to evaluate the protocol. Explain your choise of the above parameters.
• Expected results:
• Show what change in performance/evaluation you would gain by using your approach (as opposed to previous work). At this stage, show only expected/anticipated results or trends and justify your prediction. (It would also help to provide graphs with explanation of the x and y (and other!) axes).
• References: Around 6 references of high quality per project.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9889141
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Lab activity investigate system backup and restore

Lab Activity: Investigate System Backup and Restore Tools Purpose: Assess and Document Tools to Backup and Restore the System Hard Drive for a Windows 8.1 Workstation. - Assess and document the use of a system backup too ...

Question in a short paragraph explain the transmission of

Question : In a short paragraph, explain the transmission of data for a TCP connection between a client computer and a web server to request a web page. Assume that the server responds with a web page that fits in one pa ...

You just signed a 30-year lease agreement for a business

You just signed a 30-year lease agreement for a business property. The monthly rent for the first year is $1,000/month, with the ?rst month's rent due today. Starting from the second year onward, the monthly rent will be ...

Question 12326 packet tracer - configuring pap and chap

Question 1 2.3.2.6 Packet Tracer - Configuring PAP and CHAP Authentication Submit your answer as Q1.pka Question 2 2.5.1.2 Packet Tracer - Skills Integration Challenge Submit your answer as Q2.pka Question 3 3.4.2.4 Pack ...

It networking assignment - networking project areamajor lab

IT Networking Assignment - Networking Project Area Major Lab Scenario - Instructions This lab has a time limit of one term The lab must be completed by individual students, and the completed assessment returned to the as ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Rsa internet securitywhy is rsa believed to be hard to

RSA, Internet security Why is RSA believed to be hard to break? I. E. The complexity of what computational problem leads to the belief that it is secure? RSA can be used to authenticate messages by concatenateing to the ...

What is the difference between a positive economic

What is the difference between a positive economic statement and a normative one.

Prof gs farmer friend claims that aliens made crop circles

Prof G's farmer friend claims that aliens made crop circles in his farm. Using economic theory, prove his farmer friend wrong.

Advanced network design assessment - human factors in

Advanced Network Design Assessment - Human factors in network analysis and design Purpose of the assessment - This assignment is designed to assess students' knowledge and skills related to the following learning outcome ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As