Expectations from students:
The aim of this Term Paper is to produce a Programming logic or Animation on the assigned Topic. The assignment is to read the existing system/problem and create a program of your concept to obtain the expected results. Assistance from text and reference books, articles and reports on the concerned topics from Internet can be taken but the animation logic should be your own piece of work. Along with, students are supposed to write an abstract of the topic with example, real world applications, and impact on society or solutions recommended.
Abstract submission: (3-4 pages)
• Description of the topic
• Example of the given topic
• ...view middle of the document...
Internet copied contents is not accepted and marked copy case. Write in your own words.
Term Papers for CSE429
|Roll No |Topic |Description |
|1,22,34 |Writing to a Socket and create a packet |Send 10 digit numbers and check for its checksum, using UDP. |
| |with UDP | |
|2,23,35 |Writing to a Socket and Create a packet |Wrap your first name in the packet. |
| |with TCP | |
|3,24,36 |Wrap a Packet in IP after creating a |Create a class for all the header parameters of UDP and then wrap |
| |packet with UDP |your IP address in the other class created for IP packet. |
|4,58,37 |Wrap a Packet in IP after creating a |Create a class for all the header parameters of TCP and then wrap |
| |packet with TCP |your IP address in the other class created for IP packet. |
|5,59,38 |Implement IP spoofing in TCP packet |Demonstrate it by changing sender IP. |
|6,65,39 |Implement IP spoofing in UDP packet |Demonstrate it by changing sender IP. |
|7,69,40 |Implement a IP packet and set its priority|Create a class for IP header and set the priority bit in packet as|
| |as High |high by modifying packet. |
|8,70,41 |Implementation of Hidden and exposed |Design minimum of 3 objects that depict near and far terminals, |
| |terminals problem |their access and their interference levels. |
|9,71,42 |Implementation of Near and far terminals |Design minimum of 3 objects that depict near and far terminals, |
| | |their access and their interference levels. |
|10,75,43 |Implementation of agent discovery in |Take user Input key and plaintext using proper animation to |
| |mobile IP ...