Open Access. Powered by Scholars. Published by Universities.®

Computer Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Computer Engineering

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi Jan 2023

Media Streaming In A High-Rate Delay Tolerant Network, Kyle Vernyi

Williams Honors College, Honors Research Projects

Audio and video streaming across delay tolerant networks are relatively new phenomena. During the Apollo 11 mission, video and audio were streamed directly back to Earth using fully analog radios. This streaming capability atrophied over time. The gradual conversion to digital electronics contributed greatly to this. Additionally, 21st century space systems face the new requirement of interconnectedness. Delay Tolerant Networking (DTN) attempts to solve this requirement by uniting traditional point to point links into a robust and dynamic network. However, DTN implementations present bottlenecks due to low performance. High-Rate Delay Tolerant Networking (HDTN) is a performance-optimized DTN implementation. This work …


Smart Power Outlet, Kyrolos Melek, Joseph M. Garro, Ethan G. Frese, Madison Britton Jan 2023

Smart Power Outlet, Kyrolos Melek, Joseph M. Garro, Ethan G. Frese, Madison Britton

Williams Honors College, Honors Research Projects

With an ever-increasing demand on the electrical grid and an increase in electrical consumer goods per household, effective power management and monitoring for home users is a must. The objective of this project is to create a consumer outlet and companion phone application. The power outlet will measure power draw on each socket and report these measurements via an embedded system, wirelessly, to the application. The application will then allow for setting custom power draws at which an individual socket will switch off if exceeded and will display how much a given outlet or individual socket is costing per unit …


Defense Of A Small Network, Isabella Adkins Jan 2023

Defense Of A Small Network, Isabella Adkins

Williams Honors College, Honors Research Projects

A sample network will be virtually created consisting of three routers, one switch, and three hosts. The network will be secured using various methods such as enabling passwords and encryption. After the network has been properly secured, various attacks will be attempted with the goal of breaking into the network. These attacks include reconnaissance (gathering information), penetrating the network using the tool Metasploit, and attempting to get a credential phishing email to end users. If successful in the attacks, the network will be revisited and analyzed for any weaknesses or oversights.


Small Business Office Network, Michael Gerome Jan 2023

Small Business Office Network, Michael Gerome

Williams Honors College, Honors Research Projects

This project will emulate a small office network environment. The project will demonstrate the process of building and configuring the network to meet the requirements laid out in the project plan. This network includes four subnets with Windows 10 end devices and a Kali Linux device, it also includes five Cisco layer 2 switches and three Cisco routers. There are also three subnets connecting the routers to each other to enable routing between the subnets. After the network environment is set up, various penetration tests are performed from the Kali Linux device to gather information. The Nmap reconnaissance tool is …


Small Voip-Supported Network, Drina Hobson Jan 2023

Small Voip-Supported Network, Drina Hobson

Williams Honors College, Honors Research Projects

Create a small VoIP network using SIP using physical Cisco equipment. Implement advanced VoIP features such as multicast paging, voice message system & message waiting indicator, and music-on-hold.


Leveraging Ansible To Locate Network Devices, Elijah Hadden Jan 2023

Leveraging Ansible To Locate Network Devices, Elijah Hadden

Williams Honors College, Honors Research Projects

This report demonstrates the collection of Layer 2 and Layer 3 network device information using Ansible and explains the limitations identified performing such a procedure. Maintaining dynamic documentation of network information using automation would benefit network security with improvements to attack surface visibility and cyberattack incident response time. After the procedure was conducted, it was determined that Ansible alone is incapable of producing the intended information base due to the way it handles numerical variables. This report identifies limitations in Ansible’s ability to manipulate large quantities of network information and necessitates further discussion regarding what Ansible can and should be …


Space Force Design Project, Emily Greene, Ashton Orosa, Julia Patek, Nathan Doty Jan 2023

Space Force Design Project, Emily Greene, Ashton Orosa, Julia Patek, Nathan Doty

Williams Honors College, Honors Research Projects

The objective of our research project is to develop a lab testbed composed of a curved surface to represent a spacecraft hull, a mobile robot equipped with repair tools, and a robotic arm equipped with a laser 3D scanner. This project is part of a larger grant to the University of Akron from Space Force and Air Research Labs. The lab testbed developed in this project will be used to assist in creating and testing a software and algorithm to inspect and repair spacecraft while in orbit. The project will involve researching spacecraft hulls to create an accurate simulation bed, …


Human Tracking Function For Robotic Dog, Andrew Sharkey Jan 2023

Human Tracking Function For Robotic Dog, Andrew Sharkey

Williams Honors College, Honors Research Projects

With the increase the increase in automation and humans and robots working side by side, there is a need for a more organic way of controlling robots. The goal of this project is to create a control system for Boston dynamics robotic dog Spot that implements human tracking image software to follow humans using computer vision as well as using hand tracking image software to allow for control input through hand gestures.


Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz Jan 2023

Multifaceted Cybersecurity Analysis: Reconnaissance, Exploitation And Mitigation In A Controlled Network Environment, Austin Coontz

Williams Honors College, Honors Research Projects

This report details a network penetration test in a simulated environment using GNS3, focusing on the configuration of routers, switches, and hosts. The project successfully identified and exploited network vulnerabilities, including FTP access, misconfigured sudo permissions, and SMB protocol weaknesses. The penetration testing process utilized tools like fping and nmap for reconnaissance and vulnerability scanning, revealing the importance of device configurations in network security. The project concluded with mitigation strategies, emphasizing the need for secure access, robust password policies, and security controls. The experience underscored the significance of continuous learning and adaptation in the ever-evolving field of cybersecurity. The project …