0% found this document useful (0 votes)
47 views

Synopsis For Masters in Computer Science: A Framework of Internet Topology and Its Application in WLAN

Programming Final

Uploaded by

rohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views

Synopsis For Masters in Computer Science: A Framework of Internet Topology and Its Application in WLAN

Programming Final

Uploaded by

rohan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 18

A framework of internet topology and its application in WLAN

SYNOPSIS FOR MASTERS IN COMPUTER SCIENCE

Title: A framework of internet topology and its application in WLAN

Name of the student: Maaz Fazal Chaudhary

Registration No: 2019-GCUF- 073285

Date of Admission: 07-09-2018

Date of Initiation (Research): 05-01-2020

Probable Duration (Research): 6 months

Supervisory Committee:

Supervisor: Signature: _________

Co-Supervisor (If any): Name/Designation: Signature: _________

Member-1: Name/Designation: _____________Signature: __________

Member-2: Name/Designation: _____________ Signature: _________

DEPARTMENT OF COMPUTER SCIENCES

GOVERNMENT COLLEGE UNIVERSITY OF FAISALABAD

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Abstract:

Considering the importance of the Internet, it is important to verify its main characteristics
(eg efficiency, stability). Considering the importance of the Internet, it is important to verify
its main characteristics (e.g. efficiency and sustainability). As the internet grows, all aspects
of the internet face challenges, especially given the size and heterogeneity of the internet.
Internet climate capture and tagging not only provides key information for understanding the
physical infrastructure of the Internet, but also for assessing the impact of the Internet. It
depends on various factors hidden in the local environment, including routing performance,
overall final performance, and the intensity of the attack or damage. Browsing the website
highlights a lot of new research on the preemption and placement of various elements of the
network architecture. The study looked at the impact of the Internet topology on some real-
world problems. So far, we have planned the previous posts mainly based on the choice of
internet topology and divided them into the following four companies: level, router level,
popular phase, and physical phase. Whenever we look at the organization, we will discuss the
appropriate equipment and measurement strategies, fashionable information sets, applicable
functions, relevant difficult conditions, and the main conclusions of the choice. We also rank
search based on the influence of internet topics, whether it shows overall performance,
robustness, or a range of network relationships. We usually explain how to draw some
topology and selection information as input to know the maximum masking power of the
network. Finally, we are pleased that the growing reputation of cloud services in recent years
has led to fundamental changes in the topology of the internet, which has inspired similar
measurement research. In this article, we provide a comprehensive overview of a large
amount of information to perceive the most important difficult situations and take advantage
of the aging characteristics of a large number of facts.

Keyword: topology, applications of topology, impact of topology, measuring, internet


topology.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Introduction:

The Internet believes that it was originally a community that connected different educational
and military networks, but over time it has undergone continuous development and has grown
to become a large global distribution network integrated with all the factors of our daily life.
Given its importance, we need to study its health, vulnerability and connection. This is done
most efficiently by using a fixed community leaderboard. Researchers worked to better
understand the visitor's journey through the community and gain better insight into the shape
and function of their connections. Our community recreation and measurement capabilities
can also start from the range of each estimate (the number or size of subnets and the options
associated with them), these choices are specific to the unit's network. Unmarried or focus on
what is needed Community functions (such as routers). Internet topology is a key device for
reading mobile traffic information, which helps to better understand network performance
and robustness. Taking pictures of the Internet topology is a risky business, mainly due to
many factors, scale as much of the open industrial network, the network limits our ability to
fully capture its structure, visibility our network The Mighty As an evolving organization, the
Internet, in addition to redundant routing, supporting hyperlinks and lightweight clusters, also
faces a system The challenge of substitution, which limits our potential to fully grasp the state
modern network topology and the equipment the equipment the researchers rely on was
originally designed to solve the fault and its function is the Internet stack, but not the
automatic topology identification method. Despite these challenges, over the past few
decades, community assessment networks have accumulated records, advanced tools, and
improved their testing capabilities to deliver new records and measure them at unique levels
and conclusions. The insights gathered from these studies enable network designers,
engineers, ISPs, and alert builders to manage network performance, robustness, and
downtime issues. This space experiment examines previous research on various elements of
net scores to gain insight into the topology of the Internet and its implications for software
package design. At the network level, we have some understanding of cutting-edge research
in Internet topology simulation and classification. Furthermore, we rank these studies based
solely on the results of non-fiction concepts, focusing on the collections used and the
strategies used. In the second part, we will focus on the many meanings of the Internet theme
in the layout and operation of the package. These studies are carried out simultaneously with
the functions of the Internet or the concept of topology in dynamics. Furthermore, we
highlight how multiple Internet topology choices allow researchers to conduct more research.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

The results of these studies highlight the future of cloud topologies and many open and
interesting questions about internet topologies with the emergence of cloud providers and
their importance in today's networks. All other texts are as follows. First, in Part 2, we bring
the first book online and introduce readers to some of the broader taxonomies commonly
used in this press release. In section 2d, section iii provides a comprehensive overview of the
most unusual data, platforms, and devices used for topology discovery. 0.33, section provides
an assessment of new research on the discovery of etymology on the Internet. The second and
fifth parts combine recent studies using the network scale to study the capabilities and
robustness of the Internet. Finally, we explored some open questions and areas of expertise
for further study in section vi.

Research Question:
Which is the most relevant network topology and fundamental protocol to implement a
mobile cloud?

Problem Statement:
Mobile clouds are nothing but exploiting the distributed resources in wireless, mobile and
cloud platforms, says Frank HP Fitzek in his latest book. Mobile cloud is a cooperative
arrangement of dynamically connected nodes sharing opportunistically resources. Mobile
clouds can be considered as an evolutionary step toward bringing cloud-based services closer
to the user them.

Scope of Research:
The Scope of Research is the Analysis of most relevant network topology and fundamental
protocol to implement a mobile cloud.

Research Objective:
1) To identify the relevant network topology and fundamental protocol.
2) To implement a mobile cloud.

Expected Contribution:
I suggest for the Star Topology to control the cloud better.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Review literature:

CAIDA (2018) The CAIDA vessel, along with CAIDA's AS relation data from or
from other sources such as IP to geolocation data sets or data readily available on colocation
centers or operator's IXP websites. The rest of this section is organized into two sections.
First, §III-A may provide an overview of the most widely used tools and platforms for
Internet access to topology. Second, §III-B will provide a brief overview of data shares from
documents presented within §IV and §V.

Packet Clearing House (2018) (PCH) maintains more than a hundred road collectors
housed within IXPs worldwide and provides a consistent view of the international route
system presented by Routeviews and RIPE RIS. Finally, Regional Internet Registries (RIRs)
keep track of ASE route policies for each given startup using the Specified Route Policy
Language (RPSL). Historically, RPSL entries are not well received and are often not
maintained/renewed by the ASes. The submissions are mainly focused on the RIPE and
ARIN regions but are still found by investigators to find or confirm AS relationships.

V. Kotronis, G. Nomikos (2017) Kotronis et al. investigate the feasibility of


improving latency performance by renting transmission sites within collection areas. This
function attempts to (i) identify the best locations / colos to determine the transmission points
and (ii) to measure the latency progress achieved by the last two pairs. The authors selected a
set of ASes per country, comprising at least 10% of the world's population using APNIC's
IPv6 ad campaign data.

Q. Scheitle (2017) Spring et al. extracted DNS data for ISPs being researched in their
Rocket project. As part of this process, they rely on city code names that are compiled to
search for domain names that include geoin details in their name. PathAudit is a traceroute
extension that reports data embedded within router hops. In addition to geo data, PathAudit
reports on the type of interface, port speed, and router producer vendor.

RIPE (2018) RIPE Routing Information Service (RIS) is a project originally designed
to provide real-time information about the global route system from the perspective of a
number of food collectors. These router collectors periodically report a set of BGP feeds that
they receive back to the server when the data is made public. Information from these

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

collectors was used by investigators to map startups to their AS origins or to enter AS


relationships based on a set of recognized AS paths from all route collectors. Route view and
RIPE RIS provide a window into the global route system from the top networks.

G. Nomikos (2018) IXPs provide a switching fabric within one or more buildings in
which each participating AS connects their boundary line to the machine to establish dual-
view visibility with other ASes members or to establish one or more (more than one) tracking
server that is maintained by the operator -IXP. IXP members share a standard subnet
managed by IXP operators. Information about location, participating members, and IXP
startups is readily available through Peering DB, PCH, and the IXP operator website.

M. Gharaibeh (2017) Gharaibeh et al. compare the accuracy of these data sets
geolocation router interface and while Net Acuity has a much higher accuracy than Max mind
and IP2Location datasets, relying on RTT certified input of RDNS inputs is more reliable for
geolocation calls to core addresses.

Marder (2018) Marder et al. combine good practices of bdrmap and MAP-IT into
bdrmapIT, a border detection tool that enhances MAP-IT coverage without compromising
bdr map accuracy in detecting single ASN borderlines. The two strategies developed are
mainly related to the introduction of the "Origin AS Sets" which describes each connection
between routers and a collection of ASes origins from previous hop. bdrmapIT depends on a
two-step process. During the first step, the owner of the routers is directed by counting the
routers.

R. Motamedi (2019) Motamedi et al. suggests a method of installation and connection


of geolocating at the colo level. The authors receive a list of colo members from PeeringDB
and web Provider pages. A series of traceroutes looking at the steps of the previous steps The
ASes were made using available measurement platforms such as visual mirrors and RIPE
Atlas nodes in the vicinity of the oriented direction. tracerotue methods are translated into a
router-level connection graph using the alias layout and a set of heuristics based on topology
problems. The authors claim that the topology of the router level associated with the wide
range of views allows them to report traceroute malformations and are able to include the
appropriate ASes involved in each test.

B. Schlinker (2017) Schlinker et al. define the Facebook fabric edge within their PoPs
using an SDN-based program that modifies local BGP attributes to use alternative approaches

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

that will lead to specific initiatives better. The work is motivated by BGP shortcomings i.e.,
lack of awareness of communication skills and inability to properly select method in terms of
various performance metrics. Specifically BGP makes its forwarding decisions using a
combination of AS length and local metric. Facebook establishes BGP communications with
other ASes in a variety of ways namely, private communication, public viewing through
IXPs, and viewing through router servers within IXPs.

F. Wohlfart (2018) Wohlfart et al. presented an in-depth study of Akamai's


communication fabric at its edges toward its peers. Authors use end-user server (EUF)
deployments of various sizes and capabilities Two of these groups have Akamai border lines
and therefore begin public viewing with peers and deliver content directly to them while the
other two groups are hosted on another ASes network and are responsible for delivering
content entirely to other peers. Customers are redirected to the appropriate EUF server via
DNS, the map is developed by analyzing various inputs including BGP feeds collected by
Akamai routers, user performance metrics, and connection cost details.

Y. Nur and M. E. Tozal(2018) Nur et al. learn AS-level topology using multigraph
representation where AS pairs can have multiple edges between each other. Traceroute
estimates from Ark and iPlane projects at CAIDA compiled for this study. BGP IP to AS
feeds are used. The following hop addresses for BGP announcements are released on
Routeviews and RIPE RIS. By arranging IP addresses in their corresponding geo-loca.

V. Kotronis (2017) Kotronis et al. research whether it is possible to improve latency


performance by renting transmission sites within collection areas. This function attempts to
(i) identify the best locations / colos to determine the transmission points and (ii) to measure
the latency progress achieved by the last two pairs. The authors selected a collection of ASes
in each country comprising at least 19% of the national population using the APN6 IPN6
rating campaign database.

APNIC (2018) The RIPE Atlas nodes within these selected AS countries use the latest
firmware, are connected and connected, and have a stable connection over the past 30 days.
Colo transfers are selected based on a set of pinned road pins from Giotsas et al. work. Due to
the age of the database, a series of competency tests including PeeringDB data compatibility,
power tolerance, consistent ASN holder, and RTT-based geolocation tests by Periscope LGs
were performed over the database to filter out older data.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

K.-K. Yap, M. Motiwala, J. Rahe, S. Padgett, M. Holliman, G. Baldus (2017) Yap et


al. discuss the details of Espresso, an application for Google's test route infrastructure.
Similar to Espresso’s work it is motivated by the need for a well-designed fabric (both
technically and economically) that can address the challenges of traffic engineering. Unlike
the Espresso function it maintains two control layers for one flight placed at each PoP
location while the other inland controller allows Google to make additional traffic
configurations.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Table of Review of Literature:

Sr. Title Researcher Year Tools/Techniques Result


name
No.
1. IP to CAIDA 2018 IP to geolocation data Provide an overview
geolocation sets or data Problem. of the most widely
data sets or used tools and
data Problem. platforms and brief
overview of data
shares.
2. Investigate the V. Kotronis 2017 Investigate the Identify the best
feasibility of feasibility of locations / colos to
improving improving latency determine the
latency performance by transmission points
performance. renting transmission and to measure the
sites within collection latency progress
areas. achieved by the last
two pairs.
3. Extracted DNS Q. 2017 extracted DNS data Path Audit is a
data for ISPs. for ISPs being traceroute extension
Scheitle
researched in their that reports data
Rocket project embedded within
router hops.
4. Switching G. 2018 provide a switching Information about
fabric within Nomikos fabric within one or location,
one or more more buildings participating
buildings members, and IXP
startups is readily
available through
Peering DB, PCH,
and the IXP operator
website.
5. Geolocation M. 2017 accuracy of these data Rely on RTT
router interface sets geolocation certified input of
Gharaibeh
problem router interface RDNS inputs is
problem more reliable for
geolocation calls to
core addresses?
6. Good practices Marder 2018 combine good The two strategies
of bdrmap and practices of bdrmap developed are
MAP-IT into and MAP-IT into mainly related to the
bdrmapIT bdrmapIT introduction of the
"Origin AS Sets"
which describes

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

each connection
between routers and
a collection of ASes
origins from
previous hop.
7. Installation and R.Motamedi 2019 Suggests a method of ASes made using
connection of installation and available
geolocating at connection of measurement
the colo level. geolocating at the platforms such as
colo level. visual mirrors and
RIPE Atlas nodes
near the oriented
direction.
8. Define the B.Schlinker 2017 Define the Facebook Establish Facebook
Facebook fabric edge within BGP
fabric edge their PoPs using an communications
within their SDN-based program with other ASes in a
PoPs. that modifies local variety of ways
BGP namely, private
communication,
public viewing
through IXPs, and
viewing through
router servers within
IXPs.
9. Study of F.Wohlfart 2018 Presented an in-depth Develop the map
Akamai's study of Akamai's developed by
communication communication fabric analyzing various
fabric at its at its edges toward its inputs including
edges toward peers. BGP feeds collected
its peers. by Akamai routers,
user performance
metrics, and
connection cost
details.
10. AS-level Y. Nur and M. 2018 learn AS-level Arrange IP
topology using E. Tozal topology using addresses in their
multigraph multigraph corresponding geo-
representation representation location.

11. Latency V.Kotronis 2017 Research whether it is Identify the best


performance possible to improve locations / colos to
by renting latency performance determine the
transmission by renting transmission points
sites within transmission sites and measure the
collection within collection latency progress
areas. areas. achieved by the last
two pairs.
12. Nodes within APNIC 2018 Nodes within these Select the Colo
these selected selected AS countries transfers based on a
Department of Computer Science, GCUF, Faisalabad
A framework of internet topology and its application in WLAN

AS countries use the latest set of pinned road


use the latest firmware. pins from Giotsas et
firmware. al. work.
13. details of K.-K. Yap, M. 2017 discuss the details of it maintains two
Espresso, an Motiwala, J. Espresso, an control layers for
application Rahe, S. Padgett, application for one flight placed at
M. Holliman, G. Google's test route each PoP location
Baldus infrastructure while the other
inland controller
allows Google to
make additional
traffic
configurations.
14. (PCH) Packet Clearing 2018 (PCH) maintains The submissions are
maintains more House more than a hundred mainly focused on
than a hundred road collectors the RIPE and ARIN
road collectors housed within IXPs regions but are still
housed within worldwide and found by
IXPs provides a consistent investigators to find
worldwide view of the or confirm AS
international route relationships.
system presented by
Routeviews and RIPE
RIS

15. (RIS) is a RIPE 2018 (RIS) is a project Route view and


project originally designed to RIPE RIS provide a
originally provide real-time window into the
designed to information about the global route system
provide real- global route system from the top
time networks.
information.

Materials and methods/Methodology:

The methodology is the raw performance metrics such as latency and throughput can be
conducted using end-to-end measurements without any attention to the underlying topology.
While these measurements can be insightful on their own, gaining a further understanding of
the root cause of subpar performance often requires knowledge of the underlying topology.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

For example, high latency values reported through end-to-end measurements can be a side
effect of many factors including but not limited to congestion, a non-optimal route, an
overloaded server, and application level latencies. A correct understanding of the underlying
topology can only identify many of these underlying causes. Congestion can happen on
various links along the forward and reverse path, identifying the faulty congested link or
more specifically the inter-AS link requires a correct mapping for the traversed topology.
Expanding infrastructure to address congestion or subpar latency detected through end-to-end
measurements is possible through an understanding of the correct topology as well as the
interplay of routing on top of this topology. In the following Section, we will present studies
that have relied on router, AS, and physical level topologies to provide insight into various
network performancerelated issues.

The methodology for the research includes following phases.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Figure 1. Research methodology

In order to achieve our objectives, our research will include the following phases:

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Phase 1: Data Collection:


There are countless articles, books and calendars describing a range of risk mitigation, In this
phase, the information collected through different ways such as interviews, social network,
google scholar and, observation etc.
Phase 2: Analysis:

There are countless articles, books and calendars describing a range of risk mitigation
analysis, including opportunities to increase community stability through periodicity or by
exploring each of the different networks studied. In this phase, we study about WLAN and
internet topology.
Phase 3: Tools and Technique:
In this phase, the proposed a framework of internet topology and its application in WLAN
will be compare, inspect and evaluate. We can use two techniques path discovery and alias
resolution.
Phase 4: Discussion:
In this section, we will discuss all the previous sections based on their previous or current
specifications and applications, difficult situations and models, and then we will sincerely
provide our advice.
Phase 5: Thesis Writing
The last and final part is to publish the specified document in paper form.

Except Findings:

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

The internet is an indispensable part of our daily life, from mundane sports and instant
messaging to good friends, banking watching and streaming movies, as well as the
functioning of power grids and internet security features. The Internet is a collection of many
elements, such as visible infrastructure, topology, routing, and mutual use. Attributing the
final result of each project is essential, so that you have an incredible experience in the results
of each additive. The topology is linked to the Internet and its impact is evident in all its
components. Considering the scale and severity of the problems in the small topologies used,
measuring all topologies is a difficult task. Over the years, many copyright acquisition
problems have been solved and the public has shifted their awareness from providing
interconnected hyperlinks between border routers to eliminating the ability of network
topologies to obtain and acquire enough statistical data to solve problems. Common areas of
the domain problem. Although it was found that the main movement was limited to the
visible part of the Internet and the intersection of lines between the different parts of the body
still exists, there are still some open and interesting questions that need to be addressed in
fate.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

References:

G. Nomikos, V. Kotronis, P. Sermpezis, P. Gigis, L. Manassakis, C. Dietzel, S.


Konstantaras, X. Dimitropoulos, and V. Giotsas, “O peer, where art thou?:
Uncovering remote peering interconnections at ixps,” in IMC. ACM, 2018

M. Gharaibeh, A. Shah, B. Huffaker, H. Zhang, R. Ensafi, and C. Papadopoulos, “A


look at router geolocation in public and commercial databases,” in IMC. ACM, 2017.

] A. Marder, M. Luckie, A. Dhamdhere, B. Huffaker, J. M. Smith et al., “Pushing the


boundaries with bdrmapit: Mapping router ownership at internet scale,” in IMC.
ACM, 2018

R. Motamedi, B. Yeganeh, B. Chandrasekaran, R. Rejaie, B. Maggs, and W. Willinger,


“On Mapping the Interconnections in Today’s Internet,” under review for TON, 2019

K.-K. Yap, M. Motiwala, J. Rahe, S. Padgett, M. Holliman, G. Baldus, M. Hines, T.


Kim, A. Narayanan, A. Jain et al., “Taking the edge off with espresso: Scale,
reliability and programmability for global internet peering,” in SIGCOMM. ACM,
2017

] B. Schlinker, H. Kim, T. Cui, E. Katz-Bassett, H. V. Madhyastha, I. Cunha, J. Quinn,


S. Hasan, P. Lapukhov, and H. Zeng, “Engineering egress with edge fabric: Steering
oceans of content to the world,” in SIGCOMM. ACM, 2017.

F. Wohlfart, N. Chatzis, C. Dabanoglu, G. Carle, and W. Willinger, “Leveraging


interconnections for performance: the serving infrastructure of a large cdn,” in
SIGCOM. ACM, 2018.

A. Y. Nur and M. E. Tozal, “Cross-as (x-as) internet topology mapping,” Computer


Networks, 2018.

R. Beverly, R. Durairajan, D. Plonka, and J. P. Rohrer, “In the ip of the beholder:


Strategies for active ipv6 topology discovery,” in IMC. ACM, 2018.

Scheitle, O. Gasser, P. Sattler, and G. Carle, “Hloc: Hints-based geolocation


leveraging multiple measurement frameworks,” in Network Traffic Measurement and
Analysis Conference. IEEE, 2017.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

T. Green, A. Lambert, C. Pelsser, and D. Rossi, “Leveraging interdomain stability for


bgp dynamics analysis,” in PAM. Springer, 2018.

A. Dhamdhere, D. D. Clark, A. Gamero-Garrido, M. Luckie, R. K. Mok, G. Akiwate, K.


Gogia, V. Bajpai, A. C. Snoeren, and K. Claffy, “Inferring persistent interdomain
congestion,” in SIGCOMM. ACM, 2018.

V. Kotronis, G. Nomikos, L. Manassakis, D. Mavrommatis, and X. Dimitropoulos,


“Shortcuts through colocation facilities,” in IMC. ACM, 2017.

R. Fontugne, C. Pelsser, E. Aben, and R. Bush, “Pinpointing delay and forwarding


anomalies using large-scale traceroute measurements,” in IMC. ACM, 2017.

I. N. Bozkurt, W. Aqeel, D. Bhattacherjee, B. Chandrasekaran, P. B. Godfrey, G.


Laughlin, B. M. Maggs, and A. Singla, “Dissecting latency in the internet’s fiber
infrastructure,” arXiv preprint arXiv:1811.10737, 2018.

R. Durairajan, C. Barford, and P. Barford, “Lights out: Climate change risk to internet
infrastructure,” in Proceedings of the Applied Networking Research Workshop. ACM,
2018.

M. Luckie and R. Beverly, “The impact of router outages on the aslevel internet,” in
SIGCOMM. ACM, 2017.

R. Fontugne, A. Shah, and E. Aben, “The (thin) bridges of as connectivity: Measuring


dependency using as hegemony,” in PAM. Springer, 2018.

V. Giotsas, C. Dietzel, G. Smaragdakis, A. Feldmann, A. Berger, and E. Aben,


“Detecting peering infrastructure outages in the wild,” in SIGCOMM. ACM, 2017.

Department of Computer Science, GCUF, Faisalabad


A framework of internet topology and its application in WLAN

Student (Signature):_________________________________________________

Forwarded: Chairman/Director,

Department/Institute of: ________________________________________________

Faculty Scrutiny Committee:

a) _____________________________ b) ________________________________

c) _____________________________ d) _________________________________

Reviewed and Witnessed:

Dean/Director Division/Principal: ____________________________________________

Director of Advanced Studies:______________________________________________

Department of Computer Science, GCUF, Faisalabad

You might also like