You are on page 1of 14

Students who find programming complex and challenging mostly go for networking

field in computer science engineering. But even after indulging in this field they are
often confused about which topic to choose for the project or for an M.Tech thesis.
Here is the list of some of the good topics in computer networking with a basic
introduction which you can choose for your project or thesis. You can also get thesis
help and thesis guidance on these topics from experts. In the infographic below you
will find the list of latest thesis and research topics in computer networking.
TCP/IP Protocol
Now our systems computer, laptop, mobiles, and other internet devices are connected to one node

to communicate with each other and to get internet access, and this whole process called a network

system. They all are connected with the physical medium so that’s why they can be guided as

wireless network system or copper wire network system to provide calculated data speed in the

notes time frame. It spreads motions as electromagnetic waves or light pulses. The direct connection

between two nodes are considered as guided medium and is more reliable and the occurrence of

error has very less as compared to another medium. Un-guided medium is used in so many systems

to provide multiple outputs at the same time. But in this system error rate is high.

To send or receive the internet signal, the two nodes follow a set of protocol which is known as IP

(internet protocol). Each system is designed to follow this set of rules itself to generate maximum

speed with a time limit. These protocols are designed in a manner that they follow these rules one by

one. Each layer follows the protocol of the upper layer to provide services and then that layer follows

the upper layer, this process will continue until data is transmitted or received. Lower layer always

follows the basic set of rules and upper layer follows the advanced set of rules. Service provided by

both layer will be different in terms of protocol instructions.

First data is sent or received in the application layer and then in the transport layer, after following

the set of rules data then is sent to network layer to link layer and after that data has been sent to

physical layer to the user. Data is divided into small packet format to provide consistency. Common

internet protocol is RTP (Real-time Transport Protocol). which is used to provide information at the

time of gaming, movie or music streaming. first two-layer are used to transmit or receive the

information in small data packets.

Two main internet protocols are UDP (user datagram protocol) and TCP (transport control protocol).

UDP and TCP both have their advantages and disadvantages of use. UDP is used because of their

simplicity and with the use of UDP data can be sent immediately. But at the same time, it is

unreliable as compared to TCP. TCP, then again, directs the sending rate concerning the client’s

ability – stream control – and with respect to the limit of the system – clog control. It conveys the
information altogether and guarantees that all information achieve the beneficiary. The hidden

layers, similar to the system layer, are not required to perform solid conveyance.

TCP(Transmission Control Protocol) is a set of rules to access the Internet with the interconnection

of various Internet-based devices. We can say it is a communication protocol in which there is a host

with access to the Internet. This is a good topic for an M.Tech thesis in networking. If you are

planning to choose this networking topic for research, then here is some basic introduction to this.

TCP/IP provides end to end data transmission between devices along with some other functionalities

like addressing, mapping and acknowledgment. TCP/IP is a combination of two protocols. TCP

controls the messages by dividing them into packets. IP controls the transmission of these packets

from the sender to the receiver.

TCP/IP protocol layers

Following are the four layers of TCP/IP:

 Application layer

 Transport layer

 Internet layer

 Physical layer

Working of TCP/IP protocol

Client/Server model is used as a mode of communication by TCP/IP. It works in the following way:

 Application layer consists of various applications for data exchange with use of protocols like

HTTP(Hypertext Transfer Protocol), FTP(File Transfer Protocol), SMTP(Simple Mail Transfer Protocol)

 The transport layer provides end-to-end communication between the host and the user. It uses protocol

UDP(User Datagram Protocol).

 Internet layer is responsible for the transfer of packets over the network and uses IP(Internet Protocol) for

this purpose.
 The physical layer provides interconnection between the nodes.

Advantages of TCP/IP protocol

 It can be easily modified.

 It is compatible with all the operating systems.

 It is scalable in determining the most appropriate path.

Thus it is a good topic for M.Tech thesis as well as for research. A student can get thesis help on this

topic from experts specialized in thesis guidance. You can also explore the Internet for further details

on this topic.
NS2
Another good computer networking topic for an M.Tech thesis is NS2. NS stands for Network

Simulator. It is an open-source, discrete-event based network simulator mainly used for research

purpose and for teaching. It provides help in simulating routing protocols like IP, TCP, UDP, etc. It

creates a simulation environment for studying the network. Following steps are followed while

creating a simulation environment:

 Topology Definition

 Development of the model

 The configuration of the link

 Execution

 Analysis of the problem

 Visualization

NS2 create network topologies and then examines the behavior of the network under any event. The

behavior is analyzed by tracing down the events. NS2 provides text-based as well as animation-

based simulations.

Advantages of NS2

 It has the ability to support multiple protocols.


 It can represent network traffic graphically.

 It can also support multiple algorithms for routing and queuing.

NS2 is a very good topic for an M.Tech thesis in the computer networking field. You will not only get

theoretical knowledge but also practical experience of network simulator tool. You can get thesis

guidance about NS2 from an expert who has practical knowledge about how to use this tool.
MANET
MANET stands for mobile ad hoc Network and is another good choice for an M.Tech thesis topic in

networking. In MANET, the nodes are self-configurable and have the ability to move freely in any

direction and can link with other devices frequently. MANET was originally used as a military project

in defense. MANET have the challenges of weak signal strength, reliability, power consumption

along with some other problems.

Characteristics of MANET

 Each node is independent in nature i.e. each node act as the host as well as the router.

 It is based on the distributed nature of operation for security and configuration.

 The network is dynamic in nature i.e each node can join and exit the network at any time.

 The nodes in the network are associated with less memory and power.

 In MANET, the bandwidth remains fluctuating.

 MANET creates a symmetric environment such that all the nodes have identical features like responsibilities

and capabilities.

Hurdles in the path of MANET

There are certain hurdles in the path of MANET, which it has to overcome. Some of these are:

 The reliability of the transmission is affected by certain factors like data loss, interference, and blockage.

 The rate of transmission is limited to a certain range thus there is a reduced data rate.

 Packet loss can occur while transmission of data.


 Frequent path breaks.

 Lack of firewall results in security issues in the network.

This was just the introduction to MANET to give an overview of what it is if you are going with this

topic for your M.Tech thesis.

Network Security
Network Security is the set of rules to ensure the safety of the network of an organization or personal

network. You can choose this topic for your M.Tech thesis if you have a complete understanding of

how the data is transferred over the network. Network Security also include security of physical

hardware devices. Network Security in software means providing authorized access to the network

by means of ids and passwords.

Whenever a user tries to access the network, his authenticity is checked by means of ids and

passwords. This is done to prevent any malicious user from entering the network by the motive of

hacking it.

Types of attacks to network

Active Attack – In this type of attack, a hacker tries to make changes to data while it is being sent

from one node to another.

Passive Attack – In this type of attack, an outsider monitors system of the organization consistently to

find vulnerable ports.

Network Security Tools

Following are some of the tools employed in network security:

 Wireshark

 Aircrack

 Snort

 BackTrack

 Netcat
Thus if you really have significant knowledge(practical + theoretical) of networking tools, security

measures then you should choose this topic for M.Tech thesis. Besides, you will get thesis help as

well as guidance on this topic from computer networking experts.

Network Topologies
Network Topology is the arrangement of nodes in the network both physical and logical. It is an easy

topic for M.Tech thesis. Following are some of the common physical topologies:

 Bus – In the bus topology, each node is connected to the main cable known as bus such that every node is

directly connected to every other node.

 Star – In the star topology, each node is connected to a central hub such that all the nodes are indirectly

connected to each other.

 Ring – In this topology, the nodes form a closed loop such that the adjacent nodes are in direct connection

with each other.

 Token Ring – In the token ring topology, a protocol is used. A token is passed from one node to another. A

node that wants to transfer data should acquire the token.

 Mesh – In the mesh network, each node is directly connected to every other node. It can be a full mesh or

partial mesh network.

 Tree – It is the interconnection of bus topology and star topology.

 Daisy Chain – In this topology, each node is connected to two other nodes but do not form a closed loop

like ring topology.

 Hybrid – It is a combination of two or more topologies.

If you are afraid of complex topics in networking for M.Tech thesis, then this topic is for. It is

relatively simple to understand and work on. Just go for it.

IPv4/IPv6
It is another major topic in computer networking and also a good choice for a thesis or project. Ipv4

is the fourth version of Internet protocol while Ipv6 is the sixth version of Internet protocol.

Characteristics of IPv4

 It uses a 32-bit address.


 The address is written in decimal separated by dots.

 The header includes a checksum.

 Broadcast addresses are used to send data packets to other nodes.

 In this the Internet Protocol Security is optional.

Characteristics of Ipv6

 It uses a 128-bit address.

 The address is written in hexadecimal separated by colons.

 The header does not include a checksum.

 Broadcast addresses are not used to send data packets.

 The Internet Security Protocol is compulsory.

It is a good area to study how data transfer takes place over the internet. You will study the IP data

packets of Ipv4 and Ipv6. You can select this as your M.Tech thesis topic.

OSI Model
OSI stands for open system interconnection. It is another good topic for an M.Tech thesis in the

computer networking field. It provides a networking framework to implement protocols in layers.

There are seven layers of OSI Model:

1. Physical Layer – This layer is responsible for transferring digital data from the source to the destination.

2. Data Link Layer – This layer checks error in data along with the MAC address. It turns bits into data

frames.

3. Network Layer – This layer checks whether the data has reached the destination or not by examining the

source and the destination address.

4. Transport Layer – This layer transfers data over the network by using the TCP protocol.

5. Session Layer – This layer manages the events and keeps them in sequence. It supports multiple types of

connections.
6. Presentation Layer – It looks after the syntax along with encryption and decryption for the application

layer above it.

7. Application Layer – It provides end-to-end user applications using protocols like HTTP, FTP, SMTP.

It is different from the TCP/IP model. You will get a thesis guide on this topic from computer

networking experts.

WLAN
However, with the change of social economy, computer networking system changes a lot and have

also changed people’s lifestyle in a lot of aspects. As we know with the increasing demand for

network speed, a number of network provider has been also increased. Due to the maximum

number of the provider, one can easily access the high speed of the internet at a low cost. Local

area network which is used in lots more other sectors like medical, military, education and science.

Now we can see every-one need their own personal LAN (Local Area Network). Now LAN is not only

for big enterprises but it is also available for small schools and families which are looking for high

speed of data in the minimum amount.


The current speed of LAN is not enough for a user so that’s why companies are doing more

research and study to provide the data at higher speed without the use of high bandwidth. But as we

know if we want higher speed in a short time with a wide area, bandwidth will be increased to 30% to

300%. Now one of the very well known company called Huawei launched its 5G network, which is

faster than the USA 5G network. So with this network Bandwidth also increased by 300%. It is

beneficial for us but at the same time, a higher bandwidth is also not good for human life.

Various exploratory and early business LAN innovations were created during the 1970s. But then a

new term called WLAN is introduced to the world in 1997 to provide a wireless network. This

technology got famous in a very short span of time with the name of WiFi (Wireless Fidelity).

It stands for Wireless Local Area Network. It can be another good choice for an M.Tech thesis topic

in computer networking. It is a wireless distribution method that uses high-frequency radio waves

with a single access point to the Internet. In other words, it is wireless communication between two

or more devices such that users can move around in a limited range area. It is most commonly used

in homes or offices. The component connected to WLAN is referred to as the station. There are two

types of stations – Access Point, Client.

Access Points are the base stations that transmit and receive radio frequencies for wireless-enabled

devices. Clients are mobile phones, laptops, desktops connected to the wireless network.

Modes of Operation of WLAN

There are two modes of operation of WLAN:

Infrastructure – In infrastructure mode, base station act as the access point and all the nodes

communicate through this point.

Ad hoc – In Ad hoc mode, mobile devices transmit data directly using peer to peer method. In this,

there is no base station.

WLAN Advantages

 It can support a large number of devices.

 It is easy to set up wireless LAN than installing cables for the wired network.
 It is easier to access a wireless network than a wired network.

WLAN Disadvantages

 It is difficult to expand the network.

 It faces security issues like hacking.

 Interference is another problem with WLAN.

WLAN is another easier topic for an M.Tech thesis. It is used everywhere. You can take thesis help

on this topic from networking professionals.

Cryptography
It is the science of maintaining the privacy of data. It is also an easy topic to choose for your M.Tech

thesis in networking. There are three main objectives of cryptography used in transferring data over

the network:

 Confidentiality

 Integrity

 Authentication
Cryptography employs two techniques for maintaining the privacy of data:

 Encryption – In encryption, the plain text is converted into some other form known as ciphertext.

 Decryption – In this technique, the converted text i.e the ciphertext is translated back to the original text.
There are two algorithms for cryptography. In a symmetric key, both the sender and the receiver

share the same key for encryption and decryption.

In an asymmetric key, both the users have different keys respectively for encryption and decryption.

This is a familiar topic and very easy to understand. Take the guidance of a thesis expert about this

area to start with this topic.

IEEE 802
IEEE stands for Institute of Electrical and Electronics Engineers. IEEE 802 is a very challenging and

a very good topic for your thesis. IEEE 802 comes under IEEE and deal with LAN(Local Area

Network) and MAN(Metropolitan Area Network). It specifies certain services and protocols for the

data link layer and physical layer of the OSI model. IEEE is further subdivided into 22 parts that

cover a wide range of services.

IEEE 802 subdivides data link layer into two layers namely: Logical Link Layer(LLC)

Media Access Control(MAC)

You can choose any of its subfields as a part of your project or thesis. It is a very good area to

explore.

These were some of the few topics for an M.Tech thesis in computer networking. You can also

choose any one of these for research in networking or for your project. You can explore more on

these topics.

If you need help with thesis topics in computer networking, you can contact us. You can call us on this

number 91-7696666022 or email us at techsparks2013@gmail.com for M.Tech and Ph.D. thesis

help in computer networking. You can also fill the query form on the website

You might also like