Past Research

SpeakEZ

SpeakEZ is being developed as an easy-to-use communication and information system designed for textually-illiterate refugee population with a mobile phone-based voice interface to facilitate one-stop access to a broad range of assistive resources and services.

More..

Managing a network using SNMPv3

The Simple Network Management Protocol Version 3 was introduced to overcome the shortcomings of earlier versions of the protocol, related to the large scale deployment of SNMP for configuration, accounting and fault management. Earlier SNMP was primarily deployed for monitoring and performance management. First versions of SNMP failed to address security issues, forcing system and network administrators to use telnet for configuration, accounting and fault management.

More..

Implementation of a WAN emulator

A WAN emulator is a gateway that allows emulate the characteristics of a WAN network. This emulators are especially useful to test data and voice applications that might be accessed through a WAN link or the Internet. In this case, the WAN emulator gateway is set to apply different changes on the data transmitted, such as specific delays and errors. Changing these parameters test the performance of these applications and possible problems that can appear in a real environment.

More..

Configuration of a SIP Trunk

A PBX is the traditional system that enables telephones with extension numbers in an enterprise environment to be connected among themselves and to the outside public network including mobile phones networks. An IP-PBX provides for the same audio capabilities and adds video and instant messaging communications through IP packets exchanges over the enterprise internal data network.

More..

IPv6

Researchers in this area investigate the inner-workings of the IPv6 protocol with a focus on its security vulnerabilities. IPv6 is the updated version of one of the main protocols that makes the internet work. They have configured a small IPv6 network in which they perform several security attacks in order to characterize their impact on a network and their possible countermeasures. The study of similar issues on Mobile IPv6 networks is under way this semester. This work will also result in the creation of demos and lab exercises about the IPv6 protocol.

More..

Security

Researchers conduct experiments that demonstrate information security vulnerabilities, test and evaluate IT security products and technologies. In this process, they create laboratory modules that can be used in courses on information security at the iSchool. Their aim is to enhance the iSchool’s evolving curriculum by continuously coming up with comprehensive support manuals that aid students’ understanding of topics in information security.

More..

Virtualization

Virtualization, in computing, is the creation of a virtual version of a computing resource (server, client system, storage device or network resource). Virtualization technologies provide methods for dividing the resources of a computer system into multiple execution environments. These technologies can be used in enterprise environments to enhance the configuration and management of computational resources.

More..

Deep Packet Inspection

Deep packet inspection (DPI) is a networking technology that can be used by Internet Service Providers or Enterprises to monitor customer’s / employee data traffic, improve network security and collect statistical information.

More..

Unified Communication

This group studies technologies for communication systems that integrate voice, data and video services. Currently, they are focusing on software-based PBX systems that support voice-over-IP services. CCENT’s phones will be working under one of these systems as a case study. Additionally, demonstrations of the capabilities and quality of service issues surrounding voice-over-IP technology have been developed for use in iSchool courses.

More..

Wireless Communication

The work on this testbed is focused on elaborating product performance tests for wireless devices. Last fall, the researchers focused on evaluating the performance of 802.11n devices from several vendors. Development of laboratory exercises and demonstrations for courses on wireless technologies is also done by this team.

More..

Network Lab Virtualization Project

Academic organizations that want to provide students with the facilities for experimenting and learning basic and advanced concepts in networking rely on computer networking laboratories. The benefits of these facilities can be extended by enabling remote access to them for distance education purposes. This project seeks to enhance the iSchool’s networking laboratory with a new set of remote management and connectivity capabilities in order to provide lab-based instruction to distance education students on computer networking topics/scenarios.

More..