• People’s Perception of Smart Home Devices in their Homes & the Factors which Influence this Perception

      Thakur, Versha; Hash, Larry; Adviser; Marsh, John; Reviewer; Tekeoglu, Ali; Reviewer (2016-12-01)
      This thesis is to determine people’s perception of Smart home devices and the factors which influence this perception. Smart Home devices are becoming more common as many companies are launching various such devices. Although many companies are pushing these devices with extensive marketing, do people feel a need for these devices in their home? This thesis tries to find the answer to this question and what factors are affecting these opinions. Focus group methodology is used for this thesis. It is commonly used to perform qualitative researches. Based on the analysis of the Focus Group discussions, it is found that most people (from the targeted population) will be interested in adopting these smart home devices. There are some concerns which will still need to be addressed by the company such as security, Privacy and some health concerns to make the consumers more comfortable in adopting these devices.
    • Secure Routing in Mobile Ad-hoc Networks

      Jadhav, Sumedh; Hash, Larry; Adviser (2016-05-01)
      The detailed study investigates the various problems faced by Mobile Ad hoc Networks because of their inherent characteristics. The characteristics make these networks vulnerable to various attacks. The attack known to be performed on MANETs were researched in order to gain better understanding and insight on how they can be defended against. The focus of this project was to secure the routing protocols, since routing plays a vital role in the operation of network and is the target of most attacks. Various research papers were referenced for collecting the information needed. The existing routing protocols were systematically categorized and compared. Additionally, advanced routing protocols that integrate cryptographic methods into them were studied to come to a conclusion that they are the most robust protocols that effectively protect the Mobile Ad hoc Networks against some dangerous attacks. Securing the routing protocols is indeed the most important aspect for securing MANETs. However, there are other techniques that can be used as extensions for strengthening these networks, in addition to using a robust routing protocol. Recommendations have been made for the same.
    • Spanning Tree Protocol

      Kasu, Sivalasya; Hash, Larry; Adviser; Marsh, John; Reviewer; Bull, Ronny; Reviewer (2015-05-21)
      This technology case study focuses on Spanning Tree Protocol (STP). The Spanning Tree Protocol is a layer2 protocol that ensures a loop free topology for any LAN network. The basic function of STP is to prevent loops in the network. Spanning Tree Protocol is standardized as IEEE 802.1D. Spanning tree is created within a Layer 2 network of connected switches, leaves only one active path between two network devices. Spanning tree has evolutions and extensions such as; Per VLAN Spanning Tree Protocol (PVST), Rapid Spanning Tree Protocol (RSTP) and Multi Spanning Tree Protocol (MSTP).
    • Technology Case Study on Web Real-Time Communications (WebRTC)

      Karnati, Nagarjuna; Hash, Larry; Adviser (2016-05-01)
      Web real-time communication (WebRTC) is the latest technology standard which enables web browsers to communicate directly without having to install any internal or external plug-ins. WebRTC fills a critical gap in the web platform where a native proprietary app like Skype could do something which is media communication that World Wide Web just couldn’t. Now, this can be done form web using WebRTC technology. This paper starts with a brief introduction of WebRTC and how it got started. Moving on, it provides information about the WebRTC technical goals, architecture and protocols involved. This paper highlights the network address translation (NAT) traversal where STUN, TURN and ICE protocols are involved. Also, this paper highlights about the peer to peer to media flows with reference to WebRTC protocol stack and application program interface (API). In the end, this paper discusses about implemented security features, tools available for WebRTC development and provides enterprise use cases.
    • What Do Customers Really Seek From Their Mobile Service Providers?

      Ramkrishna, Deepa; Hash, Larry; Adviser; Marsh, John; Reviewer (2016-12-17)
      With the number of smartphone and wireless internet users set to increase at a rapid pace over the next few years, there is an increased need for a next generation mobile wireless technology such as 5G. Before discussing 5G, it is important to understand consumer needs today. This paper includes findings from an online survey that was administered to students and alums of SUNY Polytechnic and other universities in the US to understand what drives choice of mobile service providers. Additionally, the challenges faced by consumers with respect to their mobile and wireless use were tested and the improvements they seek was sought. The author then uses secondary research to understand if 5G will address these consumer needs and facilitate other commercial applications. While consumers might be fairly satisfied with their mobile service providers today, there is still room for improvement on some aspects such as network coverage, call quality and data speed. Implementation of 5G through efficient spectrum use and technologies such as Massive MIMO and MmWave will help address the above and also facilitate broader commercial applications in multiple industries such as driverless cars, smart cities etc.