CrowJack

  • Calculators
  • Swot Analysis
  • Pestle Analysis
  • Five Forces Analysis
  • Organizational Structure
  • Copywriting
  • Research Topics
  • Student Resources

CrowJack

Services We Provide

proof-reading

Resources We Provide

blog

Login / Register

login

  • 15 Latest Networking Research Topics for Students

Kiara Miller - Image

Comparative analysis between snort and suricata IDS software(s)

Description of the topic

The main focus of this research is to conduct a comparative analysis between Snort and Suricata software to determine which IDS software can provide better performance. There are various IDS software(s) available that can be used by organizations but it is difficult to identify which one is best (Aldarwbi et al., 2022). Different organizational structures are often facing problems while setting up an IDS system which results in false positives and intrusions. Through this research, it can be identified which IDS software is better and what secure configuration is required to detect intrusions (Waleed et al., 2022).

Research objectives

  • To evaluate Snort and Suricata IDS software(s) to determine the most optimal one.
  • To identify the false positive rate of Snort and Suricata on the networked environment.

Research questions

RQ1: Which IDS software can perform better on the production network in terms of performance, security, scalability and reliability?

RQ2: What different ways can be followed to deal with false positive problems in IDS technology?

Research methodology

The given research objectives and research questions can be addressed using quantitative research methodology where an experimental approach can be followed. For the given topic, both Snort and Suricata IDS systems should be configured and tested against different attacks. Depending on the findings, it can be analyzed which IDS software can perform better in terms of performance and security (Shuai & Li, 2021).

  • Aldarwbi, M.Y., Lashkari, A.H. and Ghorbani, A.A. (2022) “The sound of intrusion: A novel network intrusion detection system,” Computers and Electrical Engineering , 104, p. 108455.
  • Shuai, L. and Li, S. (2021) “Performance optimization of Snort based on DPDK and Hyperscan,” Procedia Computer Science , 183, pp. 837-843.
  • Waleed, A., Jamali, A.F. and Masood, A. (2022) “Which open-source ids? Snort, Suricata or Zeek,” Computer Networks , 213, p. 109116.

Role of honeypots and honey nets in network security

Network Security has become essential nowadays and there is a need for setting up robust mechanisms to maintain confidentiality and integrity (Feng et al., 2023). Due to the number of security mechanisms available, organizations found it hard to finalize and implement them on their network. For example, honey pots and honeynet approaches look almost the same and have the same purpose but work differently. Under this research topic, the configuration of honeynets and honeypots can be done to check which one can perform better security in terms of trapping cyber attackers. The entire implementation can be carried out in the cloud-based instance for improved security and it can be identified which type of honey pot technology must be preferred (Maesschalck et al., 2022).

  • To set up a honey pot system using Open Canary on the virtual instance to protect against cyber attackers.
  • To set up a honeynet system on the virtual instance to assure protection is provided against malicious attackers.
  • To test honeypots and honeynets by executing DDoS attacks to check which can provide better security.

RQ1: Why is there a need for using honeypots over honey pots in a production networked environment?

RQ2: What are the differences between cloud-based and local honey pot systems for endpoint protection?

This research can be carried out using the quantitative method of research. At the initial stage, the implementation of honeypots and honeypots can be done on the virtual instance following different security rules. Once the rules are applied, the testing can be performed using a Kali Linux machine to check whether honey pots were effective or honeynets (Gill et al., 2020).

  • Feng, H. et al. (2023) “Game theory in network security for Digital Twins in industry,” Digital Communications and Networks [Preprint].
  • Gill, K.S., Saxena, S. and Sharma, A. (2020) “GTM-CSEC: A game theoretic model for cloud security based on ids and Honeypot,” Computers & Security , 92, p. 101732
  • Maesschalck, S. et al. (2022) “Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security,” Computers & Security , 114, p. 102598.

How do malware variants are progressively improving?

This research can be based on evaluating how malware variants are progressively improving and what should be its state in the coming future. Malware is able to compromise confidential user’s information assets which is why this research can be based on identifying current and future consequences owing to its improvements (Deng et al., 2023). In this field, there is no research work that has been carried out to identify how malware variants are improving their working and what is expected to see in future. Once the evaluation is done, a clear analysis can also be done on some intelligent preventive measures to deal with dangerous malware variants and prevent any kind of technological exploitation (Tang et al., 2023).

  • To investigate types of malware variants available to learn more about malware's hidden features.
  • To focus on future implications of malware executable programs and how they can be avoided.
  • To discuss intelligent solutions to deal with all malware variants.

RQ1: How do improvements in malware variants impact enterprises?

RQ2: What additional solutions are required to deal with malware variants?

In this research, qualitative analysis can be conducted on malware variants and the main reason behind their increasing severity. The entire research can be completed based on qualitative research methodology to answer defined research questions and objectives. Some real-life case studies should also be integrated into the research which can be supported by the selected topic (Saidia Fasci et al., 2023).

  • Deng, H. et al. (2023) “MCTVD: A malware classification method based on three-channel visualization and deep learning,” Computers & Security , 126, p. 103084.
  • Saidia Fasci, L. et al. (2023) “Disarming visualization-based approaches in malware detection systems,” Computers & Security , 126, p. 103062.
  • Tang, Y. et al. (2023) “BHMDC: A byte and hex n-gram based malware detection and classification method,” Computers & Security , p. 103118.

Implementation of IoT - enabled smart office/home using cisco packet tracer

The Internet of Things has gained much more attention over the past few years which is why each enterprise and individual aims at setting up an IoT network to automate their processes (Barriga et al., 2023). This research can be based on designing and implementing an IoT-enabled smart home/office network using Cisco Packet Tracer software. Logical workspace, all network devices, including IoT devices can be used for preparing a logical network star topology (Elias & Ali, 2014). To achieve automation, the use of different IoT rules can be done to allow devices to work based on defined rules.

  • To set up an IoT network on a logical workspace using Cisco Packet Tracer simulation software.
  • To set up IoT-enabled rules on an IoT registration server to achieve automation (Hou et al., 2023).

RQ: Why is the Cisco packet tracer preferred for network simulation over other network simulators?

At the beginning of this research, a quantitative research methodology can be followed where proper experimental set-up can be done. As a packet tracer is to be used, the star topology can be used to interconnect IoT devices, sensors and other network devices at the home/office. Once a placement is done, the configuration should be done using optimal settings and all IoT devices can be connected to the registration server. This server will have IoT rules which can help in achieving automation by automatically turning off lights and fans when no motion is detected (Baggan et al., 2022).

  • Baggan, V. et al. (2022) “A comprehensive analysis and experimental evaluation of Routing Information Protocol: An Elucidation,” Materials Today: Proceedings , 49, pp. 3040–3045.
  • Barriga, J.A. et al. (2023) “Design, code generation and simulation of IOT environments with mobility devices by using model-driven development: Simulateiot-Mobile,” Pervasive and Mobile Computing , 89, p. 101751.
  • Elias, M.S. and Ali, A.Z. (2014) “Survey on the challenges faced by the lecturers in using packet tracer simulation in computer networking course,” Procedia - Social and Behavioral Sciences , 131, pp. 11–15.
  • Hou, L. et al. (2023) “Block-HRG: Block-based differentially private IOT networks release,” Ad Hoc Networks , 140, p. 103059.

Comparative analysis between AODV, DSDV and DSR routing protocols in WSN networks

For wireless sensor networks (WSN), there is a major need for using WSN routing rather than performing normal routines. As WSN networks are self-configured, there is a need for an optimal routing protocol that can improve network performance in terms of latency, jitter, and packet loss (Luo et al., 2023). There are often various problems faced when WSN networks are set up due to a lack of proper routing protocol selection. As a result of this, severe downtime is faced and all links are not able to communicate with each other easily (Hemanand et al., 2023). In this research topic, the three most widely used WSN routing protocols AODV, DSDV and DSR can be compared based on network performance. To perform analysis, three different scenarios can be created in network simulator 2 (Ns2).

  • To create three different scenarios on ns2 software to simulate a network for 1 to 100 seconds.
  • To analyze which WSN routing is optimal in terms of network performance metrics, including latency, jitter and packet loss.
  • To use CBR and NULL agents for all wireless scenarios to start with simulation purposes.

RQ: How do AODV, DSR and DSDV routing protocols differ from each other in terms of network performance?

This research can be carried out using a quantitative research method. The implementation for the provided research topic can be based on Ns2 simulation software where three different scenarios can be created (AODV, DSDV and DSR). For each scenario, NULL, CSR and UDP agents can be done to start with simulation for almost 1 to 100 seconds. For all transmissions made during the given time, network performance can be checked to determine which routing is best (Mohapatra & Kanungo, 2012).

  • Human and, D. et al. (2023) “Analysis of power optimization and enhanced routing protocols for Wireless Sensor Networks,” Measurement: Sensors , 25, p. 100610. Available at: https://doi.org/10.1016/j.measen.2022.100610.
  • Luo, S., Lai, Y. and Liu, J. (2023) “Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network,” Computers & Security , 126, p. 103083. Available at: https://doi.org/10.1016/j.cose.2022.103083.
  • Mohapatra, S. and Kanungo, P. (2012) “Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 Simulator,” Procedia Engineering , 30, pp. 69–76. Available at: https://doi.org/10.1016/j.proeng.2012.01.835.

Securing wireless network using AAA authentication and WLAN controller

Wireless networks often face intrusion attempts due to insecure protocols and sometimes open SSIDs. As a result of this, man-in-the-middle and eavesdropping attacks become easier which results in the loss of confidential information assets (Sivasankari & Kamalakkannan, 2022). When it comes to managing networks in a large area, there are higher chances for attacks that enable cyber attackers in intercepting ongoing communication sessions. However, there is currently no research conducted where the use of AAA authentication has been done with WLAN controllers to make sure a higher level of protection is provided (Nashwan, 2021). The proposed research topic can be based on securing wireless networks with the help of AAA authentication and WLAN controllers. The use of AAA authentication can be done to set up a login portal for users whilst the WLAN controller can be used for managing all wireless access points connected to the network (Nashwan, 2021).

  • To set up AAA authentication service on the wireless network simulated on Cisco Packet Tracer for proper access control.
  • To set up a WLAN controller on the network to manage all wireless access points effortlessly.
  • To use WPA2-PSK protocol on the network to assure guest users are only able to access wireless networks over a secure protocol.

RQ1: What additional benefits are offered by AAA authentication on the WLAN networks?

RQ2: Why are wireless networks more likely to face network intrusions than wired networks?

This research topic is based on the secure implementation of a wireless LAN network using a Cisco packet tracer. Hence, this research can be carried out using a quantitative research method. The implementation can be carried out using AAA authentication which can assure that access control is applied for wireless logins. On the other hand, a WLAN controller can also be configured which can ensure that all WAPs are managed (ZHANG et al., 2012).

  • Nashwan, S. (2021) “AAA-WSN: Anonymous Access Authentication Scheme for wireless sensor networks in Big Data Environment,” Egyptian Informatics Journal , 22(1), pp. 15–26.
  • Sivasankari, N. and Kamalakkannan, S. (2022) “Detection and prevention of man-in-the-middle attack in IOT network using regression modeling,” Advances in Engineering Software , 169, p. 103126.
  • ZHANG, J. et al. (2012) “AAA authentication for Network mobility,” The Journal of China Universities of Posts and Telecommunications , 19(2), pp. 81-86.

OWASP's approach to secure web applications from web application exploits

The research can revolve around the development of web applications by considering OWASP's top 10 rules. Usually, web applications are deployed by organizations depending on their requirements and these applications are vulnerable to various exploits, including injection, broken authentication and other forgery attacks (Poston, 2020). Identifying every single vulnerability is difficult when reference is not taken and often organizations end up hosting a vulnerable server that leads to privacy issues and compromises confidential information easily. In this research, OWASP's top 10 approaches can be followed to develop a secure web application that can be able to protect against top web application exploits. This approach is based on emphasizing severe and minor vulnerabilities which must be patched for protecting against web application attacks (Deepa & Thilagam, 2016).

  • The first objective can be setting up an insecure web application on the cloud environment which can be exploited with different techniques.
  • The second objective can be to consider all techniques and procedures provided by OWASP's top 10 methodologies.
  • The last objective can be applying all fixes to insecure web applications to make them resistant to OWASP top 10 attacks (Sonmez, 2019).

RQ1: What are the benefits of using OWASP's top 10 approaches to harden web applications in comparison to other security approaches?

The research methodology considered for this research project can be quantitative using an experimental approach. The practical work can be done for the selected topic using AWS or the Azure cloud platform. Simply, a virtual web server can be configured and set up with a secure and insecure web application. Following OWASP's top 10 techniques and procedures, the web application can be secured from possible attacks. In addition, insecure applications can also be exploited and results can be evaluated (Applebaum et al., 2021).

  • Applebaum, S., Gaber, T. and Ahmed, A. (2021) “Signature-based and machine-learning-based web application firewalls: A short survey,” Procedia Computer Science , 189, pp. 359–367. Available at: https://doi.org/10.1016/j.procs.2021.05.105.
  • Deepa, G. and Thilagam, P.S. (2016) “Securing web applications from injection and logic vulnerabilities: Approaches and challenges,” Information and Software Technology , 74, pp. 160–180. Available at: https://doi.org/10.1016/j.infsof.2016.02.005.
  • Poston, H. (2020) “Mapping the owasp top Ten to the blockchain,” Procedia Computer Science , 177, pp. 613-617. Available at: https://doi.org/10.1016/j.procs.2020.10.087.
  • Sonmez, F.Ö. (2019) “Security qualitative metrics for Open Web Application Security Project Compliance,” Procedia Computer Science , 151, pp. 998-1003. Available at: https://doi.org/10.1016/j.procs.2019.04.140.

Importance of configuring RADIUS (AAA) server on the network

User authentication has become significant nowadays as it guarantees that a legitimate user is accessing the network. But a problem is faced when a particular security control is to be identified for authentication and authorization. These controls can be categorized based on mandatory access controls, role-based access control, setting up captive portals and many more. Despite several other security controls, one of the most efficient ones is the RADIUS server (SONG et al., 2008). This server can authenticate users on the network to make sure network resources are accessible to only legal users. This research topic can be based on understanding the importance of RADIUS servers on the network which can also be demonstrated with the help of the Cisco Packet Tracer. A network can be designed and equipped with a RADIUS server to ensure only legal users can access network resources (WANG et al., 2009).

  • To configure RADIUS (AAA) server on the network which can be able to authenticate users who try to access network resources.
  • To simulate a network on a packet tracer simulation software and verify network connectivity.

RQ1: What are other alternatives to RADIUS (AAA) authentication servers for network security?

RQ2: What are the common and similarities between RADIUS and TACACS+ servers?

As a logical network is to be designed and configured, a quantitative research methodology can be followed. In this research coursework, a secure network design can be done using a packet tracer network simulator, including a RADIUS server along with the DMZ area. The configuration for the RADIUS server can be done to allow users to only access network resources by authenticating and authorizing (Nugroho et al., 2022).

  • Nugroho, Y.S. et al. (2022) “Dataset of network simulator related-question posts in stack overflow,” Data in Brief , 41, p. 107942.
  • SONG, M., WANG, L. and SONG, J.-de (2008) “A secure fast handover scheme based on AAA protocol in Mobile IPv6 Networks,” The Journal of China Universities of Posts and Telecommunications , 15, pp. 14-18.
  • WANG, L. et al. (2009) “A novel congestion control model for interworking AAA in heterogeneous networks,” The Journal of China Universities of Posts and Telecommunications , 16, pp. 97-101.

Comparing mod security and pF sense firewall to block illegitimate traffic

Firewalls are primarily used for endpoint security due to their advanced features ranging from blocking to IDS capabilities and many more. It is sometimes challenging to identify which type of firewall is best and due to this reason, agencies end up setting up misconfigured firewalls (Tiwari et al., 2022). This further results in a cyber breach, destroying all business operations. The research can be emphasizing conducting a comparison between the two most widely used firewalls i.e. Mod Security and pF sense. Using a virtualized environment, both firewalls can be configured and tested concerning possible cyber-attacks (Lu & Yang, 2020).

  • To use the local environment to set up Mod security and pF sense firewall with appropriate access control rules.
  • To test both firewalls by executing distributed denial of service attacks from a remote location.
  • To compare which type of firewall can provide improved performance and robust security.

RQ: How do Mod security and pF sense differ from each other in terms of features and performance?

The practical experimentation for both firewalls can be done using a virtualized environment where two different machines can be created. Hence, this research can be carried out using a quantitative research method . The first machine can have Mod security and the second machine can have pF sense configured. A new subnet can be created which can have these two machines. The third machine can be an attacking machine which can be used for testing firewalls. The results obtained can be then evaluated to identify which firewall is best for providing security (Uçtu et al., 2021).

  • Lu, N. and Yang, Y. (2020) “Application of evolutionary algorithm in performance optimization of Embedded Network Firewall,” Microprocessors and Microsystems , 76, p. 103087.
  • Tiwari, A., Papini, S. and Hemamalini, V. (2022) “An enhanced optimization of parallel firewalls filtering rules for scalable high-speed networks,” Materials Today: Proceedings , 62, pp. 4800-4805.
  • Uçtu, G. et al. (2021) “A suggested testbed to evaluate multicast network and threat prevention performance of Next Generation Firewalls,” Future Generation Computer Systems , 124, pp. 56-67.

Conducting a comprehensive investigation on the PETYA malware

The main purpose of this research is to conduct a comprehensive investigation of the PETYA malware variant (McIntosh et al., 2021). PETYA often falls under the category of ransomware attacks which not only corrupt and encrypt files but can compromise confidential information easily. Along with PETYA, there are other variants also which lead to a security outage and organizations are not able to detect these variants due to a lack of proper detection capabilities (Singh & Singh, 2021). In this research, a comprehensive analysis has been done on PETYA malware to identify its working and severity level. Depending upon possible causes of infection of PETYA malware, some proactive techniques can also be discussed (Singh & Singh, 2021). A separation discussion can also be made on other malware variants, their features, and many more.

  • The main objective of this research is to scrutinize the working of PETYA malware because a ransomware attack can impact the micro and macro environment of the organizations severely.
  • The working of PETYA malware along with its source code can be reviewed to identify its structure and encryption type.
  • To list all possible CVE IDs which are exploited by the PETYA malware.

RQ1: How dangerous is PETYA malware in comparison to other ransomware malware?

This research can be based on qualitative research methodology to evaluate the working of PETYA malware from various aspects, the methodology followed and what are its implications. The research can be initiated by evaluating the working of PETYA malware, how it is triggered, what encryption is applied and other factors. A sample source code can also be analyzed to learn more about how cryptography is used with ransomware (Abijah Roseline & Geetha, 2021).

  • Abijah Roseline, S. and Geetha, S. (2021) “A comprehensive survey of tools and techniques mitigating computer and mobile malware attacks,” Computers & Electrical Engineering , 92, p. 107143.
  • McIntosh, T. et al. (2021) “Enforcing situation-aware access control to build malware-resilient file systems,” Future Generation Computer Systems , 115, pp. 568-582.
  • Singh, J. and Singh, J. (2021) “A survey on machine learning-based malware detection in executable files,” Journal of Systems Architecture , 112, p. 101861.

Setting up a Live streaming server on the cloud platform

Nowadays, various organizations require a live streaming server to stream content depending upon their business. However, due to a lack of proper hardware, organizations are likely to face high network congestion, slowness and other problems (Ji et al., 2023). Referring to the recent cases, it has been observed that setting up a streaming server on the local environment is not expected to perform better than a cloud-based streaming server configuration (Martins et al., 2019). This particular research topic can be based on setting up a live streaming server on the AWS or Azure cloud platform to make sure high network bandwidth is provided with decreased latency. The research gap analysis would be conducted to analyze the performance of live streaming servers on local and cloud environments in terms of network performance metrics (Bilal et al., 2018).

  • To set up a live streaming server on the AWS or Azure cloud platform to provide live streaming services.
  • To use load balancers alongside streaming servers to ensure the load is balanced and scalability is achieved.
  • To use Wireshark software to test network performance during live streaming.

RQ1: Why are in-house streaming servers not able to provide improved performance in comparison to cloud-based servers?

RQ2: What additional services are provided by cloud service providers which help in maintaining network performance?

The implementation is expected to carry out on the AWS cloud platform with other AWS services i.e. load balancer, private subnet and many more (Efthymiopoulou et al., 2017). Hence, this research can be carried out using a quantitative research method. The configuration of ec2 instances can be done which can act as a streaming server for streaming media and games. For testing this project, the use of OBS studio can be done which can help in checking whether streaming is enabled or not. For network performance, Wireshark can be used for testing network performance (George et al., 2020).

  • Bilal, KErbad, A. and Hefeeda, M. (2018) “QoE-aware distributed cloud-based live streaming of multi-sourced Multiview Videos,” Journal of Network and Computer Applications , 120, pp. 130-144.
  • Efthymiopoulou, M. et al. (2017) “Robust control in cloud-assisted peer-to-peer live streaming systems,” Pervasive and Mobile Computing , 42, pp. 426-443.
  • George, L.C. et al. (2020) “Usage visualization for the AWS services,” Procedia Computer Science , 176, pp. 3710–3717.
  • Ji, X. et al. (2023) “Adaptive QoS-aware multipath congestion control for live streaming,” Computer Networks , 220, p. 109470.
  • Martins, R. et al. (2019) “Iris: Secure reliable live-streaming with Opportunistic Mobile Edge Cloud offloading,” Future Generation Computer Systems , 101, pp. 272-292.

Significance of using OSINT framework for Network reconnaissance

Network reconnaissance is becoming important day by day when it comes to penetration testing. Almost all white hat hackers are dependent on the OSINT framework to start with network reconnaissance and footprinting when it comes to evaluating organizational infrastructure. On the other hand, cyber attackers are also using this technique to start fetching information about their target. Currently, there is no investigation carried out to identify how effective the OSINT framework is over traditional reconnaissance activities (Liu et al., 2022). This research is focused on using OSINT techniques to analyze victims using different sets of tools like Maltego, email analysis and many other techniques. The analysis can be based on fetching sensitive information about the target which can be used for conducting illegal activities (Abdullah, 2019).

  • To use Maltego software to conduct network reconnaissance on the target by fetching sensitive information.
  • To compare the OSINT framework with other techniques to analyze why it performs well.

RQ1: What is the significance of using the OSINT framework in conducting network reconnaissance?

RQ2: How can the OSINT framework be used by cyber hackers for conducting illegitimate activities?

The OSINT framework is easily accessible on its official website where different search options are given. Hence, this research can be carried out using a quantitative research method. Depending upon the selected target, each option can be selected and tools can be shortlisted for final implementation. Once the tools are shortlisted, they can be used to conduct network reconnaissance (González-Granadillo et al., 2021). For example, Maltego can be used as it is a powerful software to fetch information about the target.

  • Abdullah, S.A. (2019) “Seui-64, bits an IPv6 addressing strategy to mitigate reconnaissance attacks,” Engineering Science and Technology , an International Journal, 22(2), pp. 667–672.
  • Gonzalez-Granadillo, G. et al. (2021) “ETIP: An enriched threat intelligence platform for improving OSINT correlation, analysis, visualization and sharing capabilities,” Journal of Information Security and Applications , 58, p. 102715.
  • Liu, W. et al. (2022) “A hybrid optimization framework for UAV Reconnaissance Mission Planning,” Computers & Industrial Engineering , 173, p. 108653.

Wired and wireless network hardening in cisco packet tracer

At present, network security has become essential and if enterprises are not paying attention to the security infrastructure, there are several chances for cyber breaches. To overcome all these issues, there is a need for setting up secure wired and wireless networks following different techniques such as filtered ports, firewalls, VLANs and other security mechanisms. For the practical part, the use of packet tracer software can be done to design and implement a highly secure network (Sun, 2022).

  • To use packet tracer simulation software to set up secure wired and wireless networks.
  • Use different hardening techniques, including access control rules, port filtering, enabling passwords and many more to assure only authorized users can access the network (Zhang et al., 2012).

RQ: Why is there a need for emphasizing wired and wireless network security?

Following the quantitative approach, the proposed research topic implementation can be performed in Cisco Packet Tracer simulation software. Several devices such as routers, switches, firewalls, wireless access points, hosts and workstations can be configured and interconnected using Cat 6 e cabling. For security, every device can be checked and secure design principles can be followed like access control rules, disabled open ports, passwords, encryption and many more (Smith & Hasan, 2020).

  • Smith, J.D. and Hasan, M. (2020) “Quantitative approaches for the evaluation of Implementation Research Studies,” Psychiatry Research , 283, p. 112521.
  • Sun, J. (2022) “Computer Network Security Technology and prevention strategy analysis,” Procedia Computer Science , 208, pp. 570–576.
  • Zhang, YLiang, R. and Ma, H. (2012) “Teaching innovation in computer network course for undergraduate students with a packet tracer,” IERI Procedia , 2, pp. 504–510.

Different Preemptive ways to resist spear phishing attacks

When it comes to social engineering, phishing attacks are rising and are becoming one of the most common ethical issues as it is one of the easiest ways to trick victims into stealing information. This research topic is based on following different proactive techniques which would help in resisting spear phishing attacks (Xu et al., 2023). This can be achieved by using the Go-Phish filter on the machine which can automatically detect and alert users as soon as the phished URL is detected. It can be performed on the cloud platform where the apache2 server can be configured along with an anti-phishing filter to protect against phishing attacks (Yoo & Cho, 2022).

  • To set up a virtual instance on the cloud platform with an apache2 server and anti-phishing software to detect possible phishing attacks.
  • To research spear phishing and other types of phishing attacks that can be faced by victims (Al-Hamar et al., 2021).

RQ1: Are phishing attacks growing just like other cyber-attacks?

RQ2: How effective are anti-phishing filters in comparison to cyber awareness sessions?

The entire research can be conducted by adhering to quantitative research methodology which helps in justifying all research objectives and questions. The implementation of the anti-phishing filter can be done by creating a virtual instance on the cloud platform which can be configured with an anti-phishing filter. Along with this, some phishing attempts can also be performed to check whether the filter works or not (Siddiqui et al., 2022).

  • Al-Hamar, Y. et al. (2021) “Enterprise credential spear-phishing attack detection,” Computers & Electrical Engineering , 94, p. 107363.
  • Siddiqui, N. et al. (2022) “A comparative analysis of US and Indian laws against phishing attacks,” Materials Today: Proceedings , 49, pp. 3646–3649.
  • Xu, T., Singh, K. and Rajivan, P. (2023) “Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks,” Applied Ergonomics , 108, p. 103908.
  • Yoo, J. and Cho, Y. (2022) “ICSA: Intelligent chatbot security assistant using text-CNN and multi-phase real-time defense against SNS phishing attacks,” Expert Systems with Applications , 207, p. 117893.

Evaluating the effectiveness of distributed denial of service attacks

The given research topic is based on evaluating the effectiveness of distributed denial of service attacks on cloud and local environments. Hence, this research can be carried out using a quantitative research method. Cyber attackers find DDoS as one of the most dangerous technological exploitation when it comes to impacting network availability (Krishna Kishore et al., 2023). This research can revolve around scrutinizing the impact of DDoS attacks on the local environment and cloud environment. This can be done by executing DDoS attacks on a simulated environment using hoping or other software(s) to check where it has a higher magnitude (de Neira et al., 2023).

  • To set up a server on the local and cloud environment to target using DDoS attacks for checking which had experienced slowness.
  • To determine types of DDoS attack types, their magnitude and possible mitigation techniques.

RQ: Why do DDoS attacks have dynamic nature and how is it likely to sternly impact victims?

The experimentation for this research can be executed by creating a server on the local and cloud environment. Hence, this research can be carried out using a quantitative research method. These servers can be set up as web servers using apache 2 service. On the other hand, a Kali Linux machine can be configured with DDoS execution software. Each server can be targeted with DDoS attacks to check its effectiveness (Benlloch-Caballero et al., 2023).

  • Benlloch-Caballero, P., Wang, Q. and Alcaraz Calero, J.M. (2023) “Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IOT networks from distributed denial of service attacks,” Computer Networks , 222, p. 109526.
  • de Neira, A.B., Kantarci, B. and Nogueira, M. (2023) “Distributed denial of service attack prediction: Challenges, open issues and opportunities,” Computer Networks , 222, p. 109553.
  • Krishna Kishore, P., Ramamoorthy, S. and Rajavarman, V.N. (2023) “ARTP: Anomaly-based real time prevention of distributed denial of service attacks on the web using machine learning approach,” International Journal of Intelligent Networks , 4, pp. 38–45.

Recommended Readings

Latest Web Development Research Topics

Top Management Research Topics

Newest AI Research Topics

15 Latest Networking Research Topics for Students

Research in every field is becoming more and more essential because of constant developments around the world. Similar is the case in the field of networking. This is the reason; students who are preparing to master the field of networking need to keep their knowledge of the current state of the art in the field up to date.

However, choosing the right research topic often becomes a tough task for students to carry out their research effectively. That being the case, this list contains 15 latest research topics in the field of networking. Whether you are a seasoned researcher or just starting, this list can provide you with ample inspiration and guidance to drive your research forward in the dynamic and evolving field of Networking.

Facebook

Copyright © 2023 CrowJack. All Rights Reserved

research topics in data communication and networking

Communications and Networking Research Group

PUBLICATIONS

Journal articles | other papers | conference papers | book chapters | technical reports, journal articles.

134. Vishrant Tripathi, Nick Jones, Eytan Modiano, Fresh-CSMA: A Distributed Protocol for Minimizing Age of Information, IEEE Journal on Communications and Networks, 2024.

133. Bai Liu, Quang Nguyen, Qingkai Liang, Eytan Modiano, Tracking Drift-Plus-Penalty: Utility Maximization for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, 2024.

132. Xinzhe Fu, Eytan Modiano, Optimal Routing to Parallel Servers with Unknown Utilities – Multi-armed Bandit With Queues, IEEE/ACM Transactions on Networking, January 2022.

131. Bai Liu, Qingkai Liang, Eytan Modiano, Tracking MaxWeight: Optimal Control for Partially Observable and Controllable Networks, IEEE/ACM Transactions on Networking, August 2023.

130. Xinzhe Fu, Eytan Modiano, Joint Learning and Control in Stochastic Queueing Networks with unknown Utilities, Proceedings of the ACM on Measurement and Analysis of Computing Systems, 2023.

129. Vishrant Tripathi, Rajat Talak, Eytan Modiano, Information Freshness in Multi-Hop Wireless Networks, IEEE/ACM Transactions on Networking,” April 2023.

128.  Xinzhe Fu, Eytan Modiano, “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,”  IEEE/ACM Transactions on Networking,” 2022.

127.  Bai Liu, Qiaomin Xie, Eytan Modiano,  “ RL-QN: A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), 2022.

126. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” Performance Evaluation, 2021.

125. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  Performance Evaluation, 2021.

124. Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  Transactions on Mobile Computing, April 2021.

123.  Xinyu Wu, Dan Wu, Eytan Modiano, “ Predicting Failure Cascades in Large Scale Power Systems via the Influence Model Framework, ”  IEEE Transactions on Power Systems, 2021.

122.   Roy D. Yates, Yin Sun, D. Richard Brown III, Sanjit K. Kaul, Eytan Modiano and Sennur Ulukus, “ Age of Information: An Introduction and Survey, ”  Journal on Selected Areas in Communications, February 2021.

121.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE/ACM Transactions on Networking, 2021.

120.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE Transactions on Information Theory, 2021.

119.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE/ACM IEEE/ACM Transactions on Networking, Vol. 28, No. 6, December 2020.

118.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning algorithms for scheduling in wireless networks with unknown channel statistics ,” Ad Hoc Networks, Vol. 85, pp. 131-144, 2019.

117.   Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Queueing Systems ,”  IEEE Transactions on Information Theory, 2021.

116.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Improving Age of Information in Wireless Networks with Perfect Channel State Information ,”  IEEE/ACM Transactions on Networking, Vol. 28, No. 4, August 2020.

115.   Igor Kadota and Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” IEEE Transactions on Mobile Computing, 2020.

114.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  IEEE/ACM transactions on Networking, Vol. 28, No. 1, February 2020.

113.   X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Vol. 3, No. 3, December 2019. 

112.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and Delay Scaling for Broadcast Transmission in Highly Mobile Wireless Networks ,” IEEE Transactions on Mobile Computing, 2019.

111.   Abhishek Sinha and Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions , IEEE Transactions on Mobile Computing, Vol. 19, No. 9, September 2020.

110.   Yu-Pin Hsu, Eytan Modiano, Lingjie Duan, “ Scheduling Algorithms for Minimizing Age of Information in Wireless Broadcast Networks with Random Arrivals ,”  IEEE Transactions on Mobile Computing, Vol. 19, No. 12, December 2020.

109.   Xiaolin Jiang, Hossein S. Ghadikolaei, Gabor Fodor, Eytan Modiano, Zhibo Pang, Michele Zorzi, Carlo Fischione, “ Low-latency Networking: Where Latency Lurks and How to Tame It ,”  Proceedings of the IEEE, 2019.

108.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,” IEEE Transactions on Network Science and Engineering, Vol. 6, No. 3, July-September 2019.

107.   Qingkai Liang, Hyang-Won Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,” IEEE Transactions on Mobile Computing, Vol. 18, No. 8, August 2019.

106.   A. Sinha, L. Tassiulas, E. Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  IEEE Transactions on Mobile Computing, Vol. 18, No. 5, May 2019.

105. Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Scheduling Algorithms for Optimizing Age of Information in Wireless Networks With Throughput Constraints ,”  IEEE/ACM Transactions on Networking, August 2019.

104.   Igor Kadota, Abhishek Sinha, Rahul Singh, Elif Uysal-Biyikoglu, Eytan Modjano, “ Scheduling Policies for Minimizing Age of Information in Broadcast Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 26, No. 5, October 2018.

103.   Jianan Zhang and Eytan Modiano, “ Connectivity in Interdependent Networks ,”  IEEE/ACM Transactions on Networking, 2018.

102.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,” Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 2, Issue 1, April 2018, Article No.: 11, pp 1-32. (same as Sigmetrics 2018).

101.   A. Sinha and E. Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE/ACM Transactions on Networking, 2018.

100.   Hossein Shokri-Ghadikolaei, Carlo Fischione, Eytan Modiano  “ Interference Model Similarity Index and Its Applications to mmWave Networks ,”  IEEE Transactions on Wireless Communications, 2018.

99.   Matt Johnston, Eytan Modiano, “ Wireless Scheduling with Delayed CSI: When Distributed Outperforms Centralized, ’ IEEE Transactions on Mobile Computing, 2018.

98.   A. Sinha, G. Paschos, E. Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,” IEEE/ACM Transactions on Networking, 2017.

97.   Nathan Jones, Georgios Paschos, Brooke Shrader, Eytan Modiano, “ An Overlay Architecture for Throughput Optimal Multipath Routing ,” IEEE/ACM Transactions on Networking, 2017.

96.   Greg Kuperman, Eytan Modiano, “ Providing Guaranteed Protection in Multi-Hop Wireless Networks with Interference Constraints ,” IEEE Transactions on Mobile Computing, 2017.

95.   Matt Johnston, Eytan Modiano, Isaac Kesslassy, “ Channel Probing in Opportunistic Communications Systems ,”  IEEE Transactions on Information Theory, November, 2017.

94.   Anurag Rai, Georgios Paschos, Chih-Ping Lee, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms “, IEEE/ACM Transactions on Networking, October, 2017.

93.   Matt Johnston and Eytan Modiano, “” Controller Placement in Wireless Networks with Delayed CSI ,” IEEE/ACM Transactions on Networking, 2017.

92.   Jianan Zheng, E. Modiano, D. Hay, “ Enhancing Network Robustness via Shielding ,”  IEEE Transactions on Networking, 2017.

91.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,” Mathematics of Operations Research, October, 2017.

90.   Qingkai Liang and E. Modiano, “ Survivability in Time-Varying Graphs ,”  IEEE Transactions on Mobile Computing, 2017.

89.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput-Optimal Multihop Broadcast on Directed Acyclic Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 25, No. 1, Feb. 2017.

88.   G. Celik, S. Borst, , P. Whiting , E. Modiano, “ Dynamic Scheduling with Reconfiguration Delays ,”  Queueing Systems, 2016.

87.  G. Paschos, C. P. Li, E. Modiano, K. Choumas, T. Korakis, “ In-network Congestion Control for Multirate Multicast ,”   IEEE/ACM Transactions on Networking,  2016.

86.   H. Seferoglu and E. Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,” IEEE Transactions on Mobile Computing, 2016.

85.   H. Seferoglu and E. Modiano, “ Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,” IEEE/ACM Transactions on Networking, Vol. 24, No. 3, 2016.

84.   M. Markakis, E. Modiano, J.N. Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  IEEE/ACM Transactions on Networking, 2015.

83.   S. Neumayer, E. Modiano,  “ Network Reliability Under Geographically Correlated Line and Disk Failure Models ,” Computer Networks, to appear, 2016.

82.   S. Neumayer, E. Modiano, A. Efrat, “ Geographic Max-Flow and Min-Cut Under a Circular Disk Failure Model ,” Computer Networks, 2015.

81.   Marzieh Parandehgheibi, Hyang-Won Lee, Eytan Modiano, Survivable Path Sets:  A new approach to survivability in multi-layer networks ,”  IEEE Journal on Lightwave Technology, 2015.

80.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,” Computer Networks, 2015.

79.   G. Kuperman, E. Modiano, A. Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,” IEEE/OSA Journal of Optical Communications and Networks, 2014.

78.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling over Time-Varying Channels in the presence of Heavy-Tailed Traffic ,” IEEE Transactions on Information Theory, 2014.

77.   Chih-Ping Li and Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 2, 2015.

76.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 4, 2015.

75.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,” IEEE/ACM Transactions on Networking, Vol. 23, No. 1, 2015.

74.   Matt Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,” IEEE Journal of Lightwave Technology, 2013.

73.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Queueing Networks With Heavy-Tailed Traffic, ” IEEE/ACM Transactions on Networking, 2014.

72.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE ACM Transactions on Networking, 2014.

71.   Krishna Jaggannathan and Eytan Modiano, “ The Impact of Queue Length Information on Buffer Overflow in Parallel Queues ,”  IEEE transactions on Information Theory, 2013.

70.   Krishna Jagannathan, Ishai Menashe, Gil Zussman, Eytan Modiano, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,” IEEE JSAC, special issue on Economics of Communication Networks & Systems, to appear, 2012.

69.   Guner Celik and Eytan Modiano, “ Dynamic Server Allocation over Time Varying Channels with Switchover Delay ,” IEEE Transactions on Information Theory, to appear, 2012.

68.   Anand Srinivas and Eytan Modiano, “ Joint Node Placement and Assignment for Throughput Optimization in Mobile Backbone Networks ,” IEEE JSAC, special issue on Communications Challenges and Dynamics for Unmanned Autonomous Vehicles, June, 2012.

67.   Guner Celik and Eytan Modiano, “ Controlled Mobility in Stochastic and Dynamic Wireless Networks ,” Queueing Systems, 2012.

66.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,” Internet Mathematics, Vol. 9, Nos. 2–3: 136–160.

65.   Long Le, E. Modiano, N. Shroff, “Optimal Control of Wireless Networks with Finite Buffers ,” IEEE/ACM Transactions on Networking, to appear, 2012.

64.   K. Jagannathan, M. Markakis, E. Modiano, J. Tsitsiklis, “Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic,” IEEE/ACM Transactions on Networking, Vol. 20, No. 4, August 2012.

63.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Networks with Random Link Failures, ” IEEE/ACM Transactions on Networking, December 2011.

62.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Role of Queue Length Information in Network Control ,” IEEE Transactions on Information Theory, September 2011.

61.   Hyang-Won Lee, Long Le, Eytan Modiano, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation, ” IEEE Transactions on Mobile Computing, 2011.

60.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters, ” IEEE/ACM Transactions on Networking, December 2011.

59.   Kayi Lee, Eytan Modiano, Hyang-Won Lee, “ Cross Layer Survivability in WDM-based Networks ,” IEEE/ACM Transactions on Networking, August 2011.

58.   Emily Craparo, Jon How, and Eytan Modiano, “Throughput Optimization in Mobile Backbone Networks,” IEEE Transactions on Mobile Computing, April, 2011.

57.   Hyang-Won Lee, Kayi Lee, and Eytan Modiano, “Diverse Routing in Networks with Probabilistic Failures,” IEEE/ACM Transactions on Networking, December, 2010.

56.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “MAC Protocols For Wireless Networks With Multi-packet Reception Cabaility ,” IEEE Transactions on Mobile Computing, February, 2010.

55.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, and Eytan Modiano, “Distributed Cross-Layer Algorithms for the Optimal Control of Multi-hop Wireless Networks,” IEEE/ACM Transactions on Networking, April 2010.

54.   Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission over a Wireless Channel With Deadline and Power Constraints ,” IEEE Transactions on Automatic Control, pp. 2841-2852, December, 2009.

53.   Murtaza Zafer and Eytan Modiano, “A Calculus Approach to Energy-Efficient Data Transmission with Quality of Service Constraints,” IEEE/ACM Transactions on Networking, 2009.

52.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “Construction and Maintenance of Wireless Mobile Backbone Networks,” IEEE/ACM Transactions on Networking, 2009.

51.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “Distributed Throughput Maximization in Wireless Mesh Networks Via Pre-Partitioning,” IEEE/ACM Transactions on Networking, December, 2008.

50.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks,” IEEE Transactions on Wireless Communications, December, 2008.

49.   Alessandro Tarello, Jun Sun, Murtaza Zafer and Eytan Modiano, “Minimum Energy Transmission Scheduling Subject to Deadline Constraints,” ACM Wireless Networks, October, 2008.

48.   Murtaza Zafer, Eytan Modiano, “Optimal Rate Control for Delay-Constrained Data Transmission over a Wireless Channel,” IEEE Transactions on Information Theory, September, 2008.

47.   Andrew Brzezinski and Eytan Modiano, “Achieving 100% Throughput In Reconfigurable IP/WDM Networks,” IEEE/ACM Transactions on Networking, August, 2008.

46.   Michael Neely, Eytan Modiano and C. Li, “Fairness and Optimal Stochastic Control for Heterogeneous Networks,” IEEE/ACM Transactions on Networking, September, 2008.

45.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zheng, “Cooperative Routing in Static Wireless Networks,” IEEE Transactions on Communications, November 2007.

44.   Murtaza Zafer, Eytan Modiano, “Joint Scheduling of Rate-guaranteed and Best-effort Users over a Wireless Fading Channel,” IEEE Transactions on Wireless Communications, October, 2007.

43.   Krishna Jagannathan, Sem Borst, Phil Whiting and Eytan Modiano, “Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users,” IEEE Journal of Selected Areas in Communications, September, 2007.Amir Khandani, Jinane

42.   Anand Ganti, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling in Symmetric Communication Models with Intermittent Connectivity, ” IEEE Transactions on Information Theory, March, 2007.

41.   Michael Neely and Eytan Modiano, “Logarithmic Delay for NxN Packet Switches Under Crossbar Constraints,” IEEE/ACM Transactions on Networking, November, 2007.

40.   Jun Sun, Jay Gao, Shervin Shambayati and Eytan Modiano, “Ka-Band Link Optimization with Rate Adaptation for Mars and Lunar Communications,”   International Journal of Satellite Communications and Networks, March, 2007.

39.   Jun Sun and Eytan Modiano, “Fair Allocation of A Wireless Fading Channel: An Auction Approach” Institute for Mathematics and its Applications, Volume 143: Wireless Communications, 2006.

38.   Jun Sun, Eytan Modiano and Lizhong Zhang, “Wireless Channel Allocation Using An Auction Algorithm,” IEEE Journal on Selected Areas in Communications, May, 2006.

37.   Murtaza Zafer and Eytan Modiano, “Blocking Probability and Channel Assignment for Connection Oriented Traffic in Wireless Networks,” IEEE Transactions on Wireless Communications, April, 2006.

36.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Transmission Scheduling over a fading channel with Energy and Deadline Constraints” IEEE Transactions on Wireless Communications, March,2006.

35.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks,” IEEE Transactions on Networking, April, 2006.

34.   Li-Wei Chen, Eytan Modiano and Poompat Saengudomlert, “Uniform vs. Non-Uniform band Switching in WDM Networks,” Computer Networks (special issue on optical networks), January, 2006.

33.   Andrew Brzezinski and Eytan Modiano, “Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM networks with Stochastic Traffic,” IEEE Journal of Lightwave Technology, November, 2005

32.   Randall Berry and Eytan Modiano, “Optimal Transceiver Scheduling in WDM/TDM Networks,” IEEE Journal on Selected Areas in Communications, August, 2005.

31.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “Dynamic Wavelength Assignment for WDM All-Optical Tree Networks,” IEEE Transactions on Networking, August, 2005.

30.   Ashwinder Ahluwalia and Eytan Modiano, “On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Wireless Ad Hoc Networks,” IEEE Transactions on Wireless Communications, October, 2005.

29.   Michael Neely, Charlie Rohrs and Eytan Modiano, “Equivalent Models for Analysis of Deterministic Service Time Tree Networks,” IEEE Transactions on Information Theory, October, 2005.

28.   Michael Neely and Eytan Modiano, “Capacity and Delay Tradeoffs for Ad Hoc Mobile Networks,” IEEE Transactions on Information Theory, May, 2005.

27.   Li-Wei Chen and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters,” IEEE/ACM Transactions on Networking, February, 2005. Selected as one of the best papers from Infocom 2003 for fast-track publication in IEEE/ACM Transactions on Networking.

26.   Michael Neely and Eytan Modiano, “Convexity in Queues with General Inputs,” IEEE Transactions on Information Theory, May, 2005.

25.   Anand Srinivas and Eytan Modiano, “Finding Minimum Energy Disjoint Paths in Wireless Ad Hoc Networks,” ACM Wireless Networks, November, 2005. Selected to appear in a special issue dedicated to best papers from Mobicom 2003.

24.   Michael Neely, Eytan Modiano and Charlie Rohrs, “Dynamic Power Allocation and Routing for Time-Varying Wireless Networks,” IEEE Journal of Selected Areas in Communication, January, 2005.

23.   Chunmei Liu and Eytan Modiano, “On the performance of additive increase multiplicative decrease (AIMD) protocols in hybrid space-terrestrial networks,” Computer Networks, September, 2004.

22.   Li-Wei Chen and Eytan Modiano, “Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings,” Optical Switching and Networking (Elsevier), December, 2004.

21.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “Physical Topology Design for Survivable Routing of Logical Rings in WDM-Based Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

20.   Randall Berry and Eytan Modiano, “‘The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks,” IEEE Journal of Selected Areas in Communication, October, 2004.

19.   Jun Sun and Eytan Modiano, “Routing Strategies for Maximizing Throughput in LEO Satellite Networks,,” IEEE JSAC, February, 2004.

18.   Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery for Low Earth Orbit Satellite Networks,” International Journal on Satellite Communications, June, 2003.

17.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites,” IEEE Transactions on Networking, June, 2003.

16.   Michael Neely, Eytan Modiano and Charles Rohrs, “Power Allocation and Routing in Multi-Beam Satellites with Time Varying Channels,” IEEE Transactions on Networking, February, 2003.

15.   Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks,” IEEE Journal of Selected Areas in Communication, May 2002.

14.   Aradhana Narula-Tam, Phil Lin and Eytan Modiano, “Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks,” IEEE Journal of Selected Areas in Communication, January, 2002.

13.   Brett Schein and Eytan Modiano, “Quantifying the benefits of configurability in circuit-switched WDM ring networks with limited ports per node,” IEEE Journal on Lightwave Technology, June, 2001.

12.   Aradhana Narula-Tam and Eytan Modiano, “Dynamic Load Balancing in WDM Packet Networks with and without Wavelength Constraints,” IEEE Journal of Selected Areas in Communications, October 2000.

11.   Randy Berry and Eytan Modiano, “Reducing Electronic Multiplexing Costs in SONET/WDM Rings with Dynamically Changing Traffic,” IEEE Journal of Selected Areas in Communications, October 2000.

10.   Eytan Modiano and Richard Barry, “A Novel Medium Access Control Protocol for WDM-Based LANs and Access Networks Using a Master-Slave Scheduler,” IEEE Journal on Lightwave Technology, April 2000.

9.   Eytan Modiano and Anthony Ephremides, “Communication Protocols for Secure Distributed Computation of Binary Functions,” Information and Computation, April 2000.

8.   Angela Chiu and Eytan Modiano, “Traffic Grooming Algorithms for Reducing Electronic Multiplexing Costs in WDM Ring Networks,” IEEE Journal on Lightwave Technology, January 2000.

7.   Eytan Modiano, “An Adaptive Algorithm for Optimizing the Packet Size Used in Wireless ARQ Protocols,” Wireless Networks, August 1999.

6.   Eytan Modiano, “Random Algorithms for Scheduling Multicast Traffic in WDM Broadcast-and-Select Networks,” IEEE Transactions on Networking, July, 1999.

5.   Eytan Modiano and Richard Barry, “Architectural Considerations in the Design of WDM-based Optical Access Networks,” Computer Networks, February 1999.

4.   V.W.S. Chan, K. Hall, E. Modiano and K. Rauschenbach, “Architectures and Technologies for High-Speed Optical Data Networks,” IEEE Journal of Lightwave Technology, December 1998.

3.   Eytan Modiano and Anthony Ephremides, “Efficient Algorithms for Performing Packet Broadcasts in a Mesh Network,” IEEE Transactions on Networking, May 1996.

2.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “A Simple Analysis of Queueing Delay in a Tree Network of Discrete-Time Queues with Constant Service Times,” IEEE Transactions on Information Theory, February 1996.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,” IEEE Transactions on Information Theory, July 1992.

Other Papers

5.  Eytan Modiano, “Satellite Data Networks,” AIAA Journal on Aerospace Computing, Information and Communication, September, 2004.

4.  Eytan Modiano and Phil Lin, “Traffic Grooming in WDM networks,” IEEE Communications Magazine, July, 2001.

3.  Eytan Modiano and Aradhana Narula, “Mechanisms for Providing Optical Bypass in WDM-based Networks,” SPIE Optical Networks, January 2000.

2.  K. Kuznetsov, N. M. Froberg, Eytan Modiano, et. al., “A Next Generation Optical Regional Access Networks,” IEEE Communications Magazine, January, 2000.

1.  Eytan Modiano, “WDM-based Packet Networks,” (Invited Paper) IEEE Communications Magazine, March 1999.

Conference Papers

246. Xinyu Wu, Dan Wu, Eytan Modiano, “ Overload Balancing in Single-Hop Networks With Bounded Buffers ,” IFIP Networking, 2022.

245.  Xinzhe Fu, Eytan Modiano, “ Optimal Routing for Stream Learning Systems ,”  IEEE Infocom, April 2022.

244.  Vishrant Tripathi, Luca Ballotta, Luca Carlone, E. Modiano, “ Computation and Communication Co-Design for Real-Time Monitoring and Control in Multi-Agent Systems ,”  IEEE Wiopt, 2021.

243. Eray Atay, Igor Kadota, E. Modiano, “ Aging Wireless Bandits: Regret Analysis and Order-Optimal Learning Algorithm ,”  IEEE Wiopt 2021.

242. Xinzhe Fu and E. Modiano,  “ Elastic Job Scheduling with Unknown Utility Functions ,” IFIP Performance, Milan, 2021.

241. Bai Liu and E. Modiano, “ Optimal Control for Networks with Unobservable Malicious Nodes ,”  IFIP Performance, Milan, 2021.

240. Bai Liu, Qiaomin Xie,  Eytan Modiano, “ RL-QN:  A Reinforcement Learning Framework for Optimal Control of Queueing Systems ,”  ACM Sigmetrics Workshop on Reinforcement Learning in Networks and Queues (RLNQ), 2021.

239. Xinzhe Fu and E. Modiano,  “ Learning-NUM: Network Utility Maximization with Unknown Utility Functions and Queueing Delay ,  ACM MobiHoc 2021.  

238. Vishrant Tripathi and Eytan Modiano,  “ An Online Learning Approach to Optimizing Time-Varying Costs of AoI ,”  ACM MobiHoc 2021. 

237.   Igor Kadota, Muhammad Shahir Rahman, and Eytan Modiano, “ WiFresh: Age-of-Information from Theory to Implementation ,”  International Conference on Computer Communications and Networks (ICCCN), 2021.

236. Vishrant Tripathi and Eytan Modiano, “ Age Debt: A General Framework For Minimizing Age of Information ,”  IEEE Infocom Workshop on Age-of-Information, 2021.

235. Igor Kadota, Eytan Modiano, “ Age of Information in Random Access Networks with Stochastic Arrivals ,” IEEE Infocom, 2020.

234. Igor Kadota, M. Shahir Rahman, Eytan Modiano, Poster: Age of Information in Wireless Networks: from Theory to Implementation , ACM Mobicom, 2020.

233. Xinyu Wu, Dan Wu, Eytan Modiano, “ An Influence Model Approach to Failure Cascade Prediction in Large Scale Power Systems ,” IEEE American Control Conference, July, 2020.

232. X. Fu and E. Modiano, “ Fundamental Limits of Volume-based Network DoS Attacks ,” Proc. ACM Sigmetrics, Boston, MA, June 2020.

231. Vishrant Tripathi, Eytan Modiano, “ A Whittle Index Approach to Minimizing Functions of Age of Information ,” Allerton Conference on Communication, Control, and Computing, September 2019.

230. Bai Liu, Xiaomin Xie, Eytan Modiano, “ Reinforcement Learning for Optimal Control of Queueing Systems ,” Allerton Conference on Communication, Control, and Computing, September 2019.

229. Rajat Talak, Sertac Karaman, Eytan Modiano, “ A Theory of Uncertainty Variables for State Estimation and Inference ,” Allerton Conference on Communication, Control, and Computing, September 2019.

228. Rajat Talak, Eytan Modiano, “ Age-Delay Tradeoffs in Single Server Systems ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

227. Rajat Talak, Sertac Karaman, Eytan Modiano, “ When a Heavy Tailed Service Minimizes Age of Information ,” IEEE International Symposium on Information Theory, Paris, France, July, 2019.

226. Qingkai Liang, Eytan Modiano, “ Optimal Network Control with Adversarial Uncontrollable Nodes ,” ACM MobiHoc, Catania, Italy, June 2019.

225. Igor Kadota, Eytan Modiano, “ Minimizing the Age of Information in Wireless Networks with Stochastic Arrivals ,” ACM MobiHoc, June 2019.

224. Maotong Xu, Jelena Diakonikolas, Suresh Subramaniam, Eytan Modiano, “ A Hierarchical WDM-based Scalable Data Center Network Architecture ,” IEEE International Conference on Communications (ICC), Shanghai, China, June 2019.

223. Maotong Xu, Min Tian, Eytan Modiano, Suresh Subramaniam, “ RHODA Topology Configuration Using Bayesian Optimization

222.   Anurag Rai, Rahul Singh and Eytan Modiano, “ A Distributed Algorithm for Throughput Optimal Routing in Overlay Networks ,”  IFIP Networking 2019, Warsaw, Poland, May 2019.

221.   Qingkai Liang and Eytan Modiano, “ Optimal Network Control in Partially-Controllable Networks ,”  IEEE Infocom, Paris, April 2019.

220.   Xinzhe Fu and Eytan Modiano, “ Network Interdiction Using Adversarial Traffic Flows ,”  IEEE Infocom, Paris, April 2019.

219.   Vishrant Tripathi, Rajat Talak, Eytan Modiano, “ Age Optimal Information Gathering and Dissemination on Graphs ,”  IEEE Infocom, Paris, April 2019.

218.   Jianan Zhang, Hyang-Won Lee, Eytan Modiano, “ On the Robustness of Distributed Computing Networks ,”  DRCN 2019, Coimbra, Portugal, March, 2019.

217.   Hyang-Won Lee, Jianan Zhang and Eytan Modiano, “ Data-driven Localization and Estimation of Disturbance in the Interconnected Power System ,”  IEEE Smartgridcomm, October, 2018.

216.   Jianan Zhang and Eytan Modiano, “ Joint Frequency Regulation and Economic Dispatch Using Limited Communication ,”  IEEE Smartgridcomm, October, 2018.

215.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Scheduling Policies for Age Minimization in Wireless Networks with Unknown Channel State ,”  IEEE International Symposium on Information Theory, July 2018.

214.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Online Learning Algorithms for Minimizing Queue Length Regret ,”  IEEE International Symposium on Information Theory, July 2018.

213.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Distributed Scheduling Algorithms for Optimizing Information Freshness in Wireless Networks ,”  IEEE SPAWC, Kalamata, Greece, June, 2018.

212.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Information Freshness in Wireless Networks under General Interference Constraints ,”  ACM MobiHoc 2018, Los Angeles, CA, June 2018.

211.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Learning Algorithms for Scheduling in Wireless Networks with Unknown Channel Statistics ,”  ACM MobiHoc, June 2018.

210.   Khashayar Kamran, Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Geometric Networks Under Inhomogeneous Failures ,”  Workshop on Spatial Stochastic Models for Wireless Networks (SpaSWiN), Shanghai, China, May 2018.

209.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Perfect Channel State Information ,”  Wiopt 2018, Shanghai, China, May 2018.

208.   Abhishek Sinha, Eytan Modiano, “ Network Utility Maximization with Heterogeneous Traffic Flows ,”  Wiopt 2018, Shanghai, China, May 2018.

207.   Qingkai Liang, Eytan Modiano, “ Minimizing Queue Length Regret Under Adversarial Network Models ,”  ACM Sigmetrics, 2018.

206.   Jianan Zhang, Abhishek Sinha, Jaime Llorca, Anonia Tulino, Eytan Modiano, “ Optimal Control of Distributed Computing Networks with Mixed-Cast Traffic Flows ,”  IEEE Infocom, Honolulu, HI, April 2018.

205.   Qingkai Liang, Eytan Modiano, “ Network Utility Maximization in Adversarial Environments ,”  IEEE Infocom, Honolulu, HI, April 2018.

204.   Igor Kadota, Abhishek Sinha, Eytan Modiano, “ Optimizing Age of Information in Wireless Networks with Throughput Constraints ,”  IEEE Infocom, Honolulu, HI, April 2018.

203.   QIngkai Liang, Verina (Fanyu) Que, Eytan Modiano, “ Accelerated Primal-Dual Policy Optimization for Safe Reinforcement Learning ,”  NIPS workshop on “Transparent and interpretable machine learning in safety critical environments,”December 2017.

202.   Rahul Singh, Xueying Guo,Eytan Modiano, “ Risk-Sensitive Optimal Control of Queues ,”  IEEE Conference on Decision and Control (CDC), December 2017.

201.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Minimizing Age of Information in Multi-Hop Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2017.

200.   Abhishek Sinha, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Point-to-Multipoint Transmissions ,”  ACM MobiHoc, Madras, India, July 2017.

199.   Rajat Talak, Sertac Karaman, Eytan Modiano, “ Capacity and delay scaling for broadcast transmission in highly mobile wireless networks ,”  ACM MobiHoc, Madras, India, July 2017.

198.5 . Y.-P. Hsu, E. Modiano, and L. Duan, “ Age of Information: Design and Analysis of Optimal Scheduling Algorithms ,”  IEEE International Symposium on Information Theory (ISIT), 2017.

198.   Qingkai Liang and Eytan Modiano, “ Coflow Scheduling in Input-Queued Switches: Optimal Delay Scaling and Algorithms ,”  IEEE Infocom, Atlanta, GA, May 2017.

197.   Jianan Zhang and Eytan Modiano, “ Robust Routing in Interdependent Networks ,”  IEEE Infocom, Atlanta, GA, May 2017.

196.   Abhishek Sinha, Eytan Modiano, “ Optimal Control for Generalized Network Flow Problems ,”  IEEE Infocom, Atlanta, GA, May 2017.

195.   Rajat Talak*, Sertac Karaman, Eytan Modiano, “ Speed Limits in Autonomous Vehicular Networks due to Communication Constraints ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

194.   Marzieh Parandehgheibi*, Konstantin Turitsyn, Eytan Modiano, “ Distributed Frequency Control in Power Grids Under Limited Communication ,”  IEEE Conference on Decision and Control (CDC), Las Vegas, NV, December 2016.

193.   Igor Kadota, Elif Uysal-Biyikoglu, Rahul Singh, Eytan Modiano, “ Minimizing Age of Information in Broadcast Wireless Networks ,”  Allerton Allerton Conference on Communication, Control, and Computing, September 2016.

192.   Jianan Zhang, Edmund Yeh, Eytan Modiano, “ Robustness of Interdependent Random Geometric Networks ,”  Allerton Conference on Communication, Control, and Computing, September 2016.

191.   Abhishek Sinha, Leandros Tassiulas, Eytan Modiano, “ Throughput-Optimal Broadcast in Wireless Networks with Dynamic Topology ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016. (winner of best paper award)

190.   Abishek Sinha, Georgios Paschos, Eytan Modiano, “ Throughput-Optimal Multi-hop Broadcast Algorithms ,”  ACM MobiHoc’16, Paderborn, Germany, July, 2016.

189.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Throughput Maximization in Uncooperative Spectrum Sharing Networks ,”  IEEE International Symposium on Information Theory, Barcelona, Spain, July 2016.

188.   Thomas Stahlbuhk, Brooke Shrader, Eytan Modiano, “ Topology Control for Wireless Networks with Highly-Directional Antennas ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

187.   Qingkai Liang, H.W. Lee, Eytan Modiano, “ Robust Design of Spectrum-Sharing Networks ,”  IEEE Wiopt, Tempe, Arizona, May, 2016.

186.   Hossein Shokri-Ghadikolae, Carlo Fischione and Eytan Modiano, “ On the Accuracy of Interference Models in Wireless Communications ,”  IEEE International Conference on Communications (ICC), 2016.

185.   Qingkai Liang and Eytan Modiano, “ Survivability in Time-varying Networks ,”  IEEE Infocom, San Francisco, CA, April 2016.

184.   Kyu S. Kim, Chih-Ping Li, Igor Kadota, Eytan Modiano, “ Optimal Scheduling of Real-Time Traffic in Wireless Networks with Delayed Feedback ,”  Allerton conference on Communication, Control, and Computing, September 2015.

183.   Marzieh Parandehgheibi, Eytan Modiano, “ Modeling the Impact of Communication Loss on the Power Grid Under Emergency Control ,”  IEEE SmartGridComm, Miami, FL, Nov. 2015.

182.   Anurag Rai, Chih-ping Li, Georgios Paschos, Eytan Modiano, “ Loop-Free Backpressure Routing Using Link-Reversal Algorithms ,”  Proceedings of the ACM MobiHoc, July 2015.

181.   Longbo Huang, Eytan Modiano, “ Optimizing Age of Information in a Multiclass Queueing System ,”  Proceedings of IEEE ISIT 2015, Hong Kong, Jun 2015.

180.   M. Johnston, E. Modiano, “ A New Look at Wireless Scheduling with Delayed Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

179.   M. Johnston, E. Modiano, “ Scheduling over Time Varying Channels with Hidden State Information ,”  Proceedings of IEEE ISIT 2015, Hong Kong, June 2015.

178.   M. Johnston and E. Modiano, “ Controller Placement for Maximum Throughput Under Delayed CSI ,”  IEEE Wiopt, Mombai, India, May 2015.

177.   A. Sinha, G. Paschos, C. P. Li, and E. Modiano, “ Throughput Optimal Broadcast on Directed Acyclic Graphs ,”  IEEE Infocom, Hong Kong, April 2015.

176.   J. Zheng and E. Modiano, “ Enhancing Network Robustness via Shielding ,”  IEEE Design of Reliable Communication Networks, Kansas City, March 2015.

175.   H. W. Lee and E. Modiano, “ Robust Design of Cognitive Radio Networks ,”  Information and Communication Technology Convergence (ICTC), 2014.

174.   Greg Kuperman and Eytan Modiano, “ Disjoint Path Protection in Multi-Hop Wireless Networks with Interference Constraints ,”  IEEE Globecom, Austin, TX, December 2014.

173.   Marzieh Parandehgheibi, Eytan Modiano, David Hay, “ Mitigating Cascading Failures in Interdependent Power Grids and Communication Networks ,”  IEEE Smartgridcomm, Venice, Italy, November 2014.

172.   Georgios Paschos and Eytan Modiano, “ Throughput optimal routing in overlay networks ,”  Allerton conference on Communication, Control, and Computing, September 2014.

171.   Nathan Jones, George Paschos, Brooke Shrader, Eytan Modiano, “ An overlay architecture for Throughput Optimal Multipath Routing ,”  ACM MobiHoc, August 2014.

170.   Matt Johnston, Eytan Modiano, Yuri Polyanskiy, “ Opportunistic Scheduling with Limited Channel State Information: A Rate Distortion Approach ,”  IEEE International Symposium on Information Theory, Honolulu, HI, July 2014.

169.   Chih-Ping Li, Georgios Paschos, Eytan Modiano, Leandros Tassiulas, “ Dynamic Overload Balancing in Server Farms ,”  Networking 2014, Trondheim, Norway, June, 2014.

168.   Hulya Seferonglu and Eytan Modiano, “ TCP-Aware Backpressure Routing and Scheduling ,”  Information Theory and Applications, San Diego, CA, February 2014.

167.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Delay Stability of Back-Pressure Policies in the presence of Heavy-Tailed Traffic ,”  Information Theory and Applications, San Diego, CA, February 2014.

166.   Kyu Soeb Kim, Chih-ping Li, Eytan Modiano, “ Scheduling Multicast Traffic with Deadlines in Wireless Networks ,”  IEEE Infocom, Toronto, CA, April 2014.

165.   Georgios Paschos, Chih-ping Li, Eytan Modiano, Kostas Choumas, Thanasis Korakis, “ A Demonstration of Multirate Multicast Over an 802.11 Mesh Network ,”  IEEE Infocom, Toronto, CA, April 2014.

164.   Sebastian Neumayer, Eytan Modiano, “ Assessing the Effect of Geographically Correlated Failures on Interconnected Power-Communication Networks ,”  IEEE SmartGridComm, 2013.

163.   Marzieh Parandehgheibi, Eytan Modiano, “ Robustness of Interdependent Networks: The case of communication networks and the power grid ,”  IEEE Globecom, December 2013.

162.   Matt Johnston, Eytan Modiano, “ Optimal Channel Probing in Communication Systems: The Two-Channel Case ,”  IEEE Globecom, December 2013.

161.   Mihalis Markakis, Eytan Modiano, John N. Tsitsiklis, “ Delay Analysis of the Max-Weight Policy under Heavy-Tailed Traffic via Fluid Approximations ,”  Allerton Conference, October 2013.

160.   Matthew Johnston, Isaac Keslassy, Eytan Modiano, “ Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal ,”  IEEE International Symposium on Information Theory, July 2013.

159.   Krishna P Jagannathan, Libin Jiang, Palthya Lakshma Naik, Eytan Modiano, “ Scheduling Strategies to Mitigate the Impact of Bursty Traffic in Wireless Networks ,”  11th International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks Wiopt 2013, Japan, May 2013. (Winner – Best Paper Award).

158.   Hulya Seferoglu and Eytan Modiano, “ Diff-Max: Separation of Routing and Scheduling in Backpressure-Based Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

157.   Chih-Ping Li, Eytan Modiano, “ Receiver-Based Flow Control for Networks in Overload ,”  IEEE Infocom, Turin, Italy, April 2013.

156.   Nathan Jones, Brooke Shrader, Eytan Modiano, “ Distributed CSMA with Pairwise Coding ,”  IEEE Infocom, Turin, Italy, April 2013.

155.   Greg Kuperman and Eytan Modiano, “ Network Protection with Guaranteed Recovery Times using Recovery Domains ,”  IEEE Infocom, Turin, Italy, April 2013.

154.   Greg Kuperman and Eytan Modiano, “ Providing Protection in Multi-Hop Wireless Networks ,”  IEEE Infocom, Turin, Italy, April 2013.

153.   Greg Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Network Protection with Multiple Availability Guarantees ,”  IEEE ICC workshop on New Trends in Optical Networks Survivability, June 2012.

152.   Nathaniel Jones, Brooke Shrader, Eytan Modiano, “ Optimal Routing and Scheduling for a Simple Network Coding Scheme ,”  IEEE Infocom, Orlando, Fl, March, 2012.

151.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Max-Weight Scheduling in Networks with Heavy-Tailed Traffic ,”  IEEE Infocom, Orlando, Fl, March, 2012.

150.   Guner Celik and Eytan Modiano, “ Scheduling in Networks with Time-Varying Channels and Reconfiguration Delay ,”  IEEE Infocom, Orlando, Fl, March, 2012.

149.   Sebastian Neumayer, Alon Efrat, Eytan Modiano, “ Geographic Max-Flow and Min-cut Under a Circular Disk Failure Model ,”  IEEE Infocom (MC), Orlando, Fl, March, 2012.

148.   Marzieh Parandehgheibi, Hyang-Won Lee, and Eytan Modiano, “ Survivable Paths in Multi-Layer Networks ,”  Conference on Information Science and Systems, March, 2012.

147.   Greg Kuperman, Eytan Modiano, and Aradhana Narula-Tam, “ Partial Protection in Networks with Backup Capacity Sharing ,”  Optical Fiber Communications Conference (OFC), Anaheim, CA, March, 2012.

146.   Krishna Jagannathan, Libin Jiang, Eytan Modiano, “ On Scheduling Algorithms Robust to Heavy-Tailed Traffic ,”  Information Theory and Applications (ITA), San Diego, CA, February 2012.

145.   M. Johnston, H.W. Lee, E. Modiano, “ Robust Network Design for Stochastic Traffic Demands ,”  IEEE Globecom, Next Generation Networking Symposium, Houston, TX, December 2011.

144.   S. Neumayer, E. Modiano, “ Network Reliability Under Random Circular Cuts ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

143.   H.W. Lee, K. Lee, E. Modiano, “ Maximizing Reliability in WDM Networks through Lightpath Routing ,”  IEEE Globecom, Optical Networks and Systems Symposium, Houston, TX, December 2011.

142.   Guner Celik, Sem Borst, Eytan Modiano, Phil Whiting, “ Variable Frame Based Max-Weight Algorithms for Networks with Switchover Delay ,”  IEEE International Symposium on Information Theory, St. Petersburgh, Russia, August 2011.

141.   Krishna Jaganathan, Ishai Menache, Eytan Modiano, and Gil Zussman, “ Non-cooperative Spectrum Access – The Dedicated vs. Free Spectrum Choice ,”  ACM MOBIHOC’11, May 2011.

140.   Krishna Jagannathan, Shie Mannor, Ishai Menache, Eytan Modiano, “ A State Action Frequency Approach to Throughput Maximization over Uncertain Wireless Channels ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

139.   Guner Celik, Long B. Le, Eytan Modiano, “ Scheduling in Parallel Queues with Randomly Varying Connectivity and Switchover Delay ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

138.   Gregory Kuperman, Eytan Modiano, Aradhana Narula-Tam, “ Analysis and Algorithms for Partial Protection in Mesh Networks ,”  IEEE Infocom (Mini-conference), Shanghai, China, April 2011.

137.   Matthew Johnston, Hyang-Won Lee, Eytan Modiano, “ A Robust Optimization Approach to Backup Network Design with Random Failures ,”  IEEE Infocom, Shanghai, China, April 2011.

136.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Queue Length Asymptotics for Generalized Max-Weight Scheduling in the presence of Heavy-Tailed Traffic ,”  IEEE Infocom, Shanghai, China, April 2011.

135.   Guner Celik and Eytan Modiano, “ Dynamic Vehicle Routing for Data Gathering in Wireless Networks ,”  In Proc. IEEE CDC’10, Dec. 2010..***

134.   Long B. Le, Eytan Modiano, Changhee Joo, and Ness B. Shroff, “ Longest-queue-first scheduling under the SINR interference model ,”  ACM MobiHoc, September 2010..***

133.   Krishna Jagannathan, Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Throughput Optimal Scheduling in the Presence of Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2010..**

132.   Delia Ciullo, Guner Celik, Eytan Modiano, “ Minimizing Transmission Energy in Sensor Networks via Trajectory Control ,”  IEEE Wiopt 2010, Avignon, France, June 2010, (10 pages; CD proceedings – page numbers not available).

131.   Sebastian Neumayer and Eytan Modiano, “ Network Reliability with Geographically Correlated Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

130.   Long Le, Eytan Modiano, Ness Shroff, “ Optimal Control of Wireless Networks with Finite Buffers ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).

129.   Kayi Lee, Hyang-Won Lee, Eytan Modiano, “ Reliability in Layered Network with Random Link Failures ,”  IEEE Infocom 2010, San Diego, CA, March 2010, (9 pages; CD proceedings – page numbers not available).**

128.   Krishna Jagannathan, Eytan Modiano, “ The Impact of Queue length Information on Buffer Overflow in Parallel Queues ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 1103 -1110 **

127.   Mihalis Markakis, Eytan Modiano, John Tsitsiklis, “ Scheduling Policies for Single-Hop with Heavy-Tailed Traffic ,”  Allerton Conference on Communication, Control, and Computing, September 2009, pgs. 112 – 120..**

126.   Dan Kan, Aradhana Narula-Tam, Eytan Modiano, “ Lightpath Routing and Capacity Assignment for Survivable IP-over-WDM Networks ,”  DRCN 2009, Alexandria, VA October 2009, pgs. 37 -44..**

125.   Mehdi Ansari, Alireza Bayesteh, Eytan Modiano, “ Opportunistic Scheduling in Large Scale Wireless Networks ,”  IEEE International Symposium on Information Theory, Seoul, Korea, June 2009, pgs. 1624 – 1628.

124.   Hyang-Won Lee, Eytan Modiano and Long Bao Le, “ Distributed Throughput Maximization in Wireless Networks via Random Power Allocation ,”  IEEE Wiopt, Seoul, Korea, June 2009. (9 pages; CD proceedings – page numbers not available).

123.   Wajahat Khan, Eytan Modiano, Long Le, “ Autonomous Routing Algorithms for Networks with Wide-Spread Failures ,”  IEEE MILCOM, Boston, MA, October 2009. (6 pages; CD proceedings – page numbers not available).**

122.   Guner Celik and Eytan Modiano, “ Random Access Wireless Networks with Controlled Mobility ,”  IEEE Med-Hoc-Nets, Haifa, Israel, June 2009, pgs. 8 – 14.**

121.   Hyang-Won Lee and Eytan Modiano, “ Diverse Routing in Networks with Probabilistic Failures ,”  IEEE Infocom, April 2009, pgs. 1035 – 1043.

120.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM-based Networks ,”  IEEE Infocom, April 2009, pgs. 1017 -1025..**

119.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ On the Trade-off between Control Rate and Congestion in Single Server Systems ,”  IEEE Infocom, April 2009, pgs. 271 – 279.**

118.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Vulnerability of the Fiber Infrastructure to Disasters ,”  IEEE Infocom, April 2009, pgs. 1566 – 1574.**

117.   Long Le, Krishna Jagannathan and Eytan Modiano, “ Delay analysis of max-weight scheduling in wireless ad hoc networks ,”  Conference on Information Science and Systems, Baltimore, MD, March, 2009, pgs. 389 – 394.**

116.   Krishna Jagannathan, Eytan Modiano, Lizhong Zheng, “ Effective Resource Allocation in a Queue: How Much Control is Necessary? ,”  Allerton Conference on Communication, Control, and Computing, September 2008, pgs. 508 – 515.**

115.   Sebastian Neumayer, Gil Zussman, Rueven Cohen, Eytan Modiano, “ Assessing the Impact of Geographically Correlated Network Failures ,”  IEEE MILCOM, November 2008. (6 pages; CD proceedings – page numbers not available).**

114.   Emily Craparo, Jonathan P. How, and Eytan Modiano, “ Simultaneous Placement and Assignment for Exploration in Mobile Backbone Networks ,”  IEEE conference on Decision and Control (CDC), November 2008, pgs. 1696 – 1701 **

113.   Anand Srinivas and Eytan Modiano, “ Joint node placement and assignment for throughput optimization in mobile backbone networks ,”  IEEE INFOCOM’08, pp. 1130 – 1138, Phoenix, AZ, Apr. 2008, pgs. 1130 – 1138.**

112.   Guner Celik, Gil Zussman, Wajahat Khan and Eytan Modiano, “ MAC for Networks with Multipacket Reception Capability and Spatially Distributed Nodes ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs. 1436 – 1444.**

111.   Gil Zussman, Andrew Brzezinski, and Eytan Modiano, “ Multihop Local Pooling for Distributed Throughput Maximization in Wireless Networks ,”  IEEE INFOCOM’08, Phoenix, AZ, Apr. 2008, pgs 1139 – 1147.**

110.   Emily Craparo, Jonathan How and Eytan Modiano, “ Optimization of Mobile Backbone Networks: Improved Algorithms and Approximation ,”  IEEE American Control Conference, Seattle, WA, June 2008, pgs. 2016 – 2021.**

109.   Atilla Eryilmaz, Asuman Ozdaglar, Devavrat Shah, Eytan Modiano, “ Imperfect Randomized Algorithms for the Optimal Control of Wireless Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 932 – 937.

108.   Anand Srinivas and Eytan Modiano, “ Optimal Path Planning for Mobile Backbone Networks ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2008, pgs. 913 – 918.

107.   Kayi Lee and Eytan Modiano, “ Cross-layer Survivability in WDM Networks with Multiple Failures ,”  IEEE Optical Fiber Communications Conference, San Diego, CA February, 2008 (3 pages; CD proceedings – page numbers not available).

106.   Andrew Brzezinski, Gil Zussman and Eytan Modiano, “ Local Pooling Conditions for Joint Routing and Scheduling ,”  Workshop on Information Theory and Applications, pp. 499 – 506, La Jolla, CA, January, 2008, pgs. 499 – 506.

105.   Murtaza Zafer and Eytan Modiano, “ Minimum Energy Transmission over a Wireless Fading Channel with Packet Deadlines ,”  Proceedings of IEEE Conference on Decision and Control (CDC), New Orleans, LA, December, 2007, pgs. 1148 – 1155.**

104.   Atilla Eryilmaz, Asuman Ozdaglar, Eytan Modiano, “ Polynomial Complexity Algorithms for Full Utilization of Multi-hop Wireless Networks ,”  IEEE Infocom, Anchorage, AK, April, 2007, pgs. 499 – 507.

103.   Murtaza Zafer and Eytan Modiano, “ Delay Constrained Energy Efficient Data Transmission over a Wireless Fading Channel ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2007, pgs. 289 – 298.**

102.   Atilla Eryilmaz, Eytan Modiano, Asuman Ozdaglar, “ Randomized Algorithms for Throughput-Optimality and Fairness in Wireless Networks ,”  Proceedings of IEEE Conference on Decision and Control (CDC), San Diego, CA, December, 2006, pgs. 1936 – 1941.

101.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Distributed Mobile Disk Cover – A Building Block for Mobile Backbone Networks ,”  Proc. Allerton Conf. on Communication, Control, and Computing, Allerton, IL, September 2006, (9 pages; CD proceedings – page numbers not available).**

100.   Krishna Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Scheduling of Multi-Antenna Broadcast Systems with Heterogeneous Users ,”  Allerton Conference on Communication, Control and Computing, Allerton, IL, September 2006, (10 pages; CD proceedings – page numbers not available).**

99.   Andrew Brzezinski, Gil Zussman, and Eytan Modiano, “ Enabling Distributed Throughput Maximization in Wireless Mesh Networks – A Partitioning Approach ,”  Proceedings of ACM MOBICOM’06, Los Angeles, CA, Sep. 2006, (12 pages; CD proceedings – page numbers not available).**

98.   Eytan Modiano, Devavrat Shah, and Gil Zussman, “ Maximizing Throughput in Wireless Networks via Gossiping ,”  Proc. ACM SIGMETRICS / IFIP Performance’06, Saint-Malo, France, June 2006, (12 pages; CD proceedings – page numbers not available). (best paper award)

97.   Anand Srinivas, Gil Zussman, and Eytan Modiano, “ Mobile Backbone Networks – Construction and Maintenance ,”  Proc. ACM MOBIHOC’06, Florence, Italy, May 2006, (12 pages; CD proceedings – page numbers not available).**

96.   Andrew Brzezinski and Eytan Modiano, “ Achieving 100% throughput in reconfigurable optical networks ,”  IEEE INFOCOM 2006 High-Speed Networking Workshop, Barcelona, Spain, April 2006, (5 pages; CD proceedings – page numbers not available).**

95.   Krishna P. Jagannathan, Sem Borst, Phil Whiting, Eytan Modiano, “ Efficient scheduling of multi-user multi-antenna systems ,”  Proceedings of WiOpt 2006, Boston, MA, April 2006, (8 pages; CD proceedings – page numbers not available).**

94.   Andrew Brzezinski and Eytan Modiano, “ Greedy weighted matching for scheduling the input-queued switch ,”  Conference on Information Sciences and Systems (CISS), Princeton, NJ, March 2006, pgs. 1738 – 1743.**

93.   Murtaza Zafer and Eytan Modiano, “ Optimal Adaptive Data Transmission over a Fading Channel with Deadline and Power Constraints ,”  Conference on Information Sciences and Systems (CISS), Princeton, New Jersey, March 2006, pgs. 931 – 937.**

92.   Li-Wei Chen and E. Modiano, “ A Geometric Approach to Capacity Provisioning in WDM Networks with Dynamic Traffic ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 1676 – 1683, **

91.   Jun Sun and Eytan Modiano, “ Channel Allocation Using Pricing in Satellite Networks ,”  Conference on Information Science and Systems (CISS), Princeton, NJ, March, 2006, pgs. 182 – 187.**

90.   Jun Sun, Jay Gao, Shervin Shambayatti and Eytan Modiano, “ Ka-Band Link Optimization with Rate Adaptation ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (7 pages; CD proceedings – page numbers not available).

89.   Alessandro Tarello, Eytan Modiano and Jay Gao, “ Energy efficient transmission scheduling over Mars proximity links ,”  IEEE Aerospace Conference, Big Sky, MN, March, 2006. (10 pages; CD proceedings – page numbers not available).

88.   A. Brzezinski and E. Modiano, “ RWA decompositions for optimal throughput in reconfigurable optical networks ,”  INFORMS Telecommunications Conference, Dallas, TX, March 2006 (3 pages; CD proceedings – page numbers not available).**

87.   Li Wei Chen and E. Modiano, “ Geometric Capacity Provisioning for Wavelength Switched WDM Networks ,”  Workshop on Information Theory and Application, University of California, San Diego, CA, February, 2006. (8 pages; CD proceedings – page numbers not available).**

86.   Murtaza Zafer and Eytan Modiano, “ Joint Scheduling of Rate-guaranteed and Best-effort Services over a Wireless Channel ,”  IEEE Conference on Decision and Control, Seville, Spain, December, 2005, pgs. 6022–6027.**

85.   Jun Sun and Eytan Modiano, “ Opportunistic Power Allocation for Fading Channels with Non-cooperative Users and Random Access ,”  IEEE BroadNets – Wireless Networking Symposium, Boston, MA, October, 2005, pgs. 397–405.**

84.   Li Wei Chen and Eytan Modiano, “ Uniform vs. Non-uniform Band Switching in WDM Networks ,”  IEEE BroadNets-Optical Networking Symposium, Boston, MA, October, 2005, pgs. 219– 228.**

83.   Sonia Jain and Eytan Modiano, “ Buffer Management Schemes for Enhanced TCP Performance over Satellite Links ,”  IEEE MILCOM, Atlantic City, NJ, October 2005 (8 pages; CD proceedings – page numbers not available).**

82.   Murtaza Zafer and Eytan Modiano, “ Continuous-time Optimal Rate Control for Delay Constrained Data Transmission ,”  Allerton Conference on Communications, Control and Computing, Allerton, IL, September, 2005 (10 pages; CD proceedings – page numbers not available).**

81.   Alessandro Tarello, Eytan Modiano, Jun Sun, Murtaza Zafer, “ Minimum Energy Transmission Scheduling subject to Deadline Constraints ,”  IEEE Wiopt, Trentino, Italy, April, 2005, pgs. 67–76. (Winner of best student paper award).**

80.   Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “ Reliability and Route Diversity in Wireless Networks ,”  Conference on Information Science and System, Baltimore, MD, March, 2005, (8 pages; CD proceedings – page numbers not available).**

79.   Andrew Brzezinski, Iraj Saniee, Indra Widjaja, Eytan Modiano, “ Flow Control and Congestion Management for Distributed Scheduling of Burst Transmissions in Time-Domain Wavelength Interleaved Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Anaheim, CA, March, 2005, pgs. WC4-1–WC4-3.

78.   Andrew Brzezinski and Eytan Modiano, “ Dynamic Reconfiguration and Routing Algorithms for IP-over-WDM Networks with Stochastic Traffic ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 6–11.**

77.   Murtaza Zafer and Eytan Modiano, “ A Calculus Approach to Minimum Energy Transmission Policies with Quality of Service Guarantees ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 548–559.**

76.   Michael Neely and Eytan Modiano, “ Fairness and optimal stochastic control for heterogeneous networks ,”  IEEE Infocom 2005, Miami, FL, March, 2005, pgs. 1723 – 1734.**

75.   Aradhana Narula-Tam, Thomas G. Macdonald, Eytan Modiano, and Leslie Servi, “ A Dynamic Resource Allocation Strategy for Satellite Communications ,”  IEEE MILCOM, Monterey, CA, October, 2004, pgs. 1415 – 1421.

74.   Li-Wei Chen, Poompat Saengudomlert and Eytan Modiano, “ Optimal Waveband Switching in WDM Networks ,”  IEEE International Conference on Communication (ICC), Paris, France, June, 2004, pgs. 1604 – 1608.**

73.   Michael Neely and Eytan Modiano, “ Logarithmic Delay for NxN Packet Switches ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, AZ, April, 2004, pgs. 3–9.**

72.   Li-Wei Chen and Eytan Modiano, “ Dynamic Routing and Wavelength Assignment with Optical Bypass using Ring Embeddings ,”  IEEE Workshop on High performance Switching and Routing (HPSR 2004), Phoenix, Az, April, 2004, pgs. 119–125.**

71.   Randall Berry and Eytan Modiano, “ On the Benefits of Tunability in Reducing Electronic Port Counts in WDM/TDM Networks ,”  IEEE Infocom, Hong Kong, March 2004, pgs. 1340–1351.

70.   Andrew Brzezinski and Eytan Modiano, “ A new look at dynamic traffic scheduling in WDM networks with transceiver tuning latency ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2004, pgs. 25–26.**

69.   Chunmei Liu and Eytan Modiano, “ Packet Scheduling with Window Service Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 178–184.**

68.   Jun Sun, Eytan Modiano, and Lizhong Zheng, “ A Novel Auction Algorithm for Fair Allocation of a Wireless Fading Channel ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 1377–1383.**

67.   Murtaza Zafer and Eytan Modiano, “ Impact of Interference and Channel Assignment on Blocking Probability in Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2004, pgs. 430–436.**

66.   Chunmei Liu and Eytan Modiano, “ An Analysis of TCP over Random Access Satellite Links ,”  IEEE Wireless Communications and Networking Conference (WCNC), Atlanta, GA, February, 2004, pgs. 2033–2040..**

65.   Randall Berry and Eytan Modiano, “ Using tunable optical transceivers for reducing the number of ports in WDM/TDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC), Los Angeles, CA, February, 2004, pgs. 23–27.

64.   Aradhana Narula-Tam, Eytan Modiano and Andrew Brzezinski, “ Physical Topology Design for Survivable Routiing of Logical Rings in WDM-based Networks ,”  IEEE Globecom, San francisco, CA, December, 2003, pgs. 2552–2557.

63.   Jun Sun, Lizhong Zheng and Eytan Modiano, “ Wireless Channel Allocation Using an Auction Algorithm ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1114–1123..**

62.   Amir Khandani, Jinane Abounadi, Eytan Modiano, Lizhong Zhang, “ Cooperative Routing in Wireless Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, pgs. 1270–1279.**

61.   Poompat Saengudomlert, Eytan Modiano and Robert Gallager, “ Dynamic Wavelength Assignment for WDM all optical Tree Networks ,”  Allerton Conference on Communications, Control and Computing, October, 2003, 915–924.**

60.   Aradhana Narula-Tam and Eytan Modiano, “ Designing Physical Topologies that Enable Survivable Routing of Logical Rings ,”  IEEE Workshop on Design of Reliable Communication Networks (DRCN), October, 2003, pgs. 379–386.

59.   Anand Srinivas and Eytan Modiano, “ Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks ,”  ACM Mobicom, San Diego, Ca, September, 2003, pgs. 122–133.**

58.   Michael Neely and Eytan Modiano, “ Improving Delay in Ad-Hoc Mobile Networks Via Redundant Packet Transfers ,”  Conference on Information Science and System, Baltimore, MD, March, 2003 (6 pages; CD proceedings – page numbers not available).**

57.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Dynamic Power Allocation and Routing for Time Varying Wireless Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 745–755.**

56.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying Channel ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1095–1105.**

55.   Poompat Saengudomlert, Eytan Modiano and Rober Gallager, “ On-line Routing and Wavelength Assignment for Dynamic Traffic in WDM Ring and Torus Networks ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1805–1815.**

54.   Li-Wei Chen and Eytan Modiano, “ Efficient Routing and Wavelength Assignment for Reconfigurable WDM Networks with Wavelength Converters ,”  IEEE Infocom 2003, San Francisco, CA, April, 2003, pgs. 1785–1794. Selected as one of the best papers of Infocom 2003 for fast track publication in IEEE/ACM Transactions on Networking.**

53.   Mike Neely, Jun Sun and Eytan Modiano, “ Delay and Complexity Tradeoffs for Dynamic Routing and Power Allocation in a Wireless Network ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 157 –159.**

52.   Anand Ganti, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling for Multi-Channel Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 1318–1327.**

51.   Poompat Saengudomlert, Eytan Modiano, and Robert G. Gallager, “ Optimal Wavelength Assignment for Uniform All-to-All Traffic in WDM Tree Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, October, 2002, pgs. 528–537.**

50.   Hungjen Wang, Eytan Modiano and Muriel Medard, “ Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 719–725.**

49.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations ,”  IEEE International Symposium on Computer Communications (ISCC), Taormina, Italy, July 2002, pgs. 77–84.**

48.   Alvin Fu, Eytan Modiano, and John Tsitsiklis, “ Optimal Energy Allocation and Admission Control for Communications Satellites ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 648–656.**

47.   Michael Neely, Eytan Modiano and Charles Rohrs, “ Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels ,”  IEEE INFOCOM 2002, New York, June, 2002, pgs. 1451–1460..**

46.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Tradeoffs in Delay Guarantees and Computation Complexity for N x N Packet Switches ,”  Conference on Information Science and Systems, Princeton, NJ, March, 2002, pgs. 136–148.**

45.   Alvin Fu, Eytan Modiano and John Tsitsiklis, “ Transmission Scheduling Over a Fading Channel with Energy and Deadline Constraints ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1018–1023.**

44.   Chunmei Liu and Eytan Modiano, “ On the Interaction of Layered Protocols: The Case of Window Flow Control and ARQ ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 118–124.**

43.   Mike Neely, Eytan Modiano and Charles Rohrs, “ Packet Routing over Parallel Time-varying Queues with Application to Satellite and Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 360–366.**

42.   Ahluwalia Ashwinder, Eytan Modiano and Li Shu, “ On the Complexity and Distributed Construction of Energy Efficient Broadcast Trees in Static Ad Hoc Wireless Networks ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 807–813.**

41.   Jun Sun and Eytan Modiano, “ Capacity Provisioning and Failure Recovery for Satellite Constellations ,”  Conference on Information Science and System, Princeton, NJ, March, 2002, pgs. 1039–1045.**

40.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Partial Path Protection for WDM networks ,”  Informs Telecommunications Conference, Boca Raton, FL, March 2002, pgs. 78–79.**

39.   Poompat Saengudomlert, Eytan H. Modiano, and Robert G. Gallager, “ An On-Line Routing and Wavelength Assignment Algorithm for Dynamic Traffic in a WDM Bidirectional Ring ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1331–1334.**

38.   Randy Berry and Eytan Modiano, “ Switching and Traffic Grooming in WDM Networks ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1340–1343.

37.   Eytan Modiano, Hungjen Wang, and Muriel Medard, “ Using Local Information for WDM Network Protection ,”  Joint Conference on Information Sciences (JCIS), Durham, North Carolina, March, 2002, pgs. 1398–1401.**

36.   Aradhana Narula-Tam and Eytan Modiano, “ Network architectures for supporting survivable WDM rings ,”  IEEE/OSA Optical Fiber Conference (OFC) 2002, Anaheim, CA, March, 2002, pgs. 105–107.

35.   Michael Neely, Eytan Modiano, Charles Rohrs, “ Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 1110-1111.**

34.   Eytan Modiano and Randy Berry, “ The Role of Switching in Reducing Network Port Counts ,”  Allerton Conference on Communication, Control, and Computing, Allerton, Illinois, September, 2001, pgs. 376-385.

33.   Eytan Modiano, “ Resource allocation and congestion control in next generation satellite networks ,”  IEEE Gigabit Networking Workshop (GBN 2001), Anchorage, AK, April 2001, (2 page summary-online proceedings).

32.   Eytan Modiano and Aradhana Narula-Tam, “ Survivable Routing of Logical Topologies in WDM Networks ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 348–357.

31.   Michael Neely and Eytan Modiano, “ Convexity and Optimal Load Distribution in Work Conserving */*/1 Queues ,”  IEEE Infocom 2001, Anchorage, AK, April 2001, pgs. 1055–1064.

30.   Eytan Modiano and Randy Berry, “ Using Grooming Cross- Connects to Reduce ADM Costs in Sonet/WDM Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. WL1- WL3.

29.   Eytan Modiano and Aradhana Narula-Tam, “ Designing Survivable Networks Using Effective Rounting and Wavelenght Assignment (RWA) ,”  IEEE/OSA Optical Fiber Conference (OFC) 2001, Anaheim, CA March 2001, pgs. TUG5-1 – TUG5– 3.

28.   Roop Ganguly and Eytan Modiano, “ Distributed Algorithms and Architectures for Optical Flow Switching in WDM networks ,”  IEEE International Symposium on Computer Communications (ISCC 2000), Antibes, France, July 2000, pgs. 134–139.

27.   Aradhana Narula-Tam, Philip J. Lin and Eytan Modiano, “ Wavelength Requirements for Virtual topology Reconfiguration in WDM Ring Networks ,”  IEEE International Conference on Communications (ICC 2000), New Orleans, LA, June 2000, pgs. 1650–1654.

26.   Eytan Modiano, “Optical Flow Switching for the Next Generation Internet,”  IEEE Gigabit Networking Workshop (GBN 2000), Tel-aviv, March 2000 (2 page summary-online proceedings).

25.   Aradhana Narula and Eytan Modiano, “ Dynamic Reconfiguration in WDM Packet Networks with Wavelength Limitations ,”  IEEE/OSA Optical Fiber Conference (OFC) 2000, Baltimore, MD, March, 2000, pgs. 1210–1212.

24.   Brett Schein and Eytan Modiano, “ Quantifying the benefits of configurability in circuit-switched WDM ring networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs.1752–1760..***

23.   Aradhana Narula-Tam and Eytan Modiano, “ Load Balancing Algorithms for WDM-based IP networks ,”  IEEE Infocom 2000, Tel Aviv, Israel, April, 2000, pgs. 1010–1019.

22.   Nan Froberg, M. Kuznetsov, E. Modiano, et. al., “ The NGI ONRAMP test bed: Regional Access WDM technology for the Next Generation Internet ,”  IEEE LEOS ’99, October, 1999, pgs. 230–231.

21.   Randy Berry and Eytan Modiano, “ Minimizing Electronic Multiplexing Costs for Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE International Conference on Communications (ICC ’99), Vancouver, CA, June 1999, pgs. 1724–1730..***

20.   Brett Schein and Eytan Modiano, “Increasing Traffic Capacity in WDM Ring Networks via Topology Reconfiguration,”  Conference on Information Science and Systems, Baltimore, MD, March 1999, pgs. 201 – 206.

19.   Eytan Modiano and Richard Barry, “ Design and Analysis of an Asynchronous WDM Local Area Network Using a Master/Slave Scheduler ,”  IEEE Infocom ’99, New York, NY, March 1999, pgs. 900–907.

18.   Randy Berry and Eytan Modiano, “ Grooming Dynamic Traffic in Unidirectional SONET Ring Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’99, San Diego, CA, February 1999, pgs. 71–73.

17.   Angela Chiu and Eytan Modiano, “ Reducing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks Via Efficient Traffic Grooming ,”  IEEE Globecom ’98, Sydney, Australia, November 1998, pgs. 322–327.

16.   Eytan Modiano, “ Throughput Analysis of Unscheduled Multicast Transmissions in WDM Broadcast-and-Select Networks ,”  IEEE International Symposium on Information Theory, Boston, MA, September 1998, pg. 167.

15.   Eytan Modiano and Angela Chiu, “Traffic Grooming Algorithms for Minimizing Electronic Multiplexing Costs in Unidirectional SONET/WDM Ring Networks,”  Conference on Information Science and Systems, Princeton, NJ, March 1998, 653–658.

14.   Eytan Modiano and Eric Swanson, “ An Architecture for Broadband Internet Services over a WDM-based Optical Access Network ,”  IEEE Gigabit Networking Workshop (GBN ’98), San Francisco, CA, March 1998 (2 page summary-online proceedings).

13.   Eytan Modiano, “ Unscheduled Multicasts in WDM Broadcast-and-Select Networks ,”  IEEE Infocom ’98, San Francisco, CA, March 1998, pgs. 86–93.

12.   Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control (MAC) protocol for WDM Networks ,”  IEEE/OSA Optical Fiber Conference (OFC) ’98, San Jose, CA, February 1998, pgs. 90–91.

11.   Eytan Modiano, “ Scheduling Algorithms for Message Transmission Over a Satellite Broadcast System ,”  IEEE MILCOM 97, Monterey, CA, November 1997, pgs. 628–634.

10.   Eytan Modiano, “ Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length ,”  IEEE International Conference on Computer Communications and Networks (IC3N) Las Vegas, Nevada, September 1997, pgs. 350–357.

9.   Eytan Modiano, “A Simple Algorithm for Optimizing the Packet Size Used in ARQ Protocols Based on Retransmission History,”  Conference on Information Science and Systems, Baltimore, MD, March 1997, pgs. 672–677.

8.   Eytan Modiano, “ A Multi-Channel Random Access Protocol for the CDMA Channel ,”  IEEE PIMRC ’95, Toronto, Canada, September 1995, pgs. 799–803.

7.   Eytan Modiano Jeffrey Wieselthier and Anthony Ephremides, “ A Simple Derivation of Queueing Delay in a Tree Network of Discrete-Time Queues with Deterministic Service Times ,”  IEEE International Symposium on Information Theory, Trondheim, Norway, June 1994, pg. 372.

6.   Eytan Modiano, Jeffrey Wieselthier and Anthony Ephremides, “An Approach for the Analysis of Packet Delay in an Integrated Mobile Radio Network,”  Conference on Information Sciences and Systems, Baltimore, MD, March 1993, pgs. 138-139.

5.   Eytan Modiano and Anthony Ephremides, “ A Method for Delay Analysis of Interacting Queues in Multiple Access Systems ,”  IEEE INFOCOM 1993, San Francisco, CA, March 1993, pgs. 447 – 454.

4.   Eytan Modiano and Anthony Ephremides, “ A Model for the Approximation of Interacting Queues that Arise in Multiple Access Schemes ,”  IEEE International Symposium on Information Theory, San Antonio, TX, January 1993, pg. 324.

3.   Eytan Modiano and Anthony Ephremides, “ Efficient Routing Schemes for Multiple Broadcasts in a Mesh ,”  Conference on Information Sciences and Systems, Princeton, NJ, March 1992, pgs. 929 – 934.

2.   Eytan Modiano and Anthony Ephremides, “ On the Secrecy Complexity of Computing a Binary Function of Non-uniformly Distributed Random Variables ,”  IEEE International Symposium on Information Theory, Budapest, Hungary, June 1991, pg. 213.

1.   Eytan Modiano and Anthony Ephremides, “Communication Complexity of Secure Distributed Computation in the Presence of Noise,”  IEEE International Symposium on Information Theory, San Diego, CA, January 1990, pg. 142.

Book Chapters

  • Hyang-Won Lee, Kayi Lee, Eytan Modiano, “ Cross-Layer Survivability ” in Cross-Layer Design in Optical Networks, Springer, 2013.
  • Li-Wei Chen and Eytan Modiano, “ Geometric Capacity Provisioning for Wavelength-Switched WDM Networks ,” Chapter in Computer Communications and Networks Series: Algorithms for Next Generation Networks, Springer, 2010.
  • Amir Khandani, Eytan Modiano, Lizhong Zhang, Jinane Aboundi, “ Cooperative Routing in Wireless Networks ,” Chapter in Advances in Pervasive Computing and Networking, Kluwer Academic Publishers, 2005.
  • Jian-Qiang Hu and Eytan Modiano, “ Traffic Grooming in WDM Networks ,” Chapter in Emerging Optical Network Technologies, Kluwer Academic Publishers, to appear, 2004.
  • Eytan Modiano, “ WDM Optical Networks ,” Wiley Encyclopedia of Telecommunications (John Proakis, Editor), 2003.
  • Eytan Modiano, “ Optical Access Networks for the Next Generation Internet ,” in Optical WDM Networks: Principles and Practice, Kluwer Academic Prublishers, 2002.
  • Eytan Modiano, Richard Barry and Eric Swanson, “ A Novel Architecture and Medium Access Control protocol for WDM Networks ,” Trends in Optics and Photonics Series (TOPS) volume on Optical Networks and Their Applications, 1998.
  • Eytan Modiano and Kai-Yeung Siu, “Network Flow and Congestion Control,” Wiley Encyclopedia of Electrical and Electronics Engineering, 1999.

Technical Reports

  • Amir Khandani, Eytan Modiano, Jinane Abounadi, Lizhong Zheng, “Reliability and Route Diversity in Wireless Networks, ” MIT LIDS Technical Report number 2634, November, 2004.
  • Anand Srinivas and Eytan Modiano, “Minimum Energy Disjoint Path Routing in Wireless Ad Hoc Networks, ” MIT LIDS Technical Report, P-2559, March, 2003.
  • Eytan Modiano and Aradhana Narula-Tam, “Survivable lightpath routing: a new approach to the design of WDM-based networks, ” LIDS report 2552, October, 2002.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Packet Routing over Parallel Time-Varying Queues with Application to Satellite and Wireless Networks,” LIDS report 2520, September, 2001.
  • Jun Sun and Eytan Modiano, “Capacity Provisioning and Failure Recovery in Mesh-Torus Networks with Application to Satellite Constellations,” LIDS report 2518, September, 2001.
  • Hungjen Wang, Eytan Modiano and Muriel Medard, “Partial Path Protection for WDM Networks: End-to-End Recovery Using Local Failure Information, ” LIDS report 2517, Sept. 2001.
  • Alvin Fu, Eytan Modiano, and John Tsitsiklis, “Optimal Energy Allocation and Admission Control for Communications Satellites, ” LIDS report 2516, September, 2001.
  • Michael Neely, Eytan Modiano and Charles Rohrs, “Power and Server Allocation in a Multi-Beam Satellite with Time Varying Channels, ” LIDS report 2515, September, 2001.
  • Eytan Modiano, “Scheduling Algorithms for Message Transmission Over the GBS Satellite Broadcast System, ” Lincoln Laboratory Technical Report Number TR-1035, June 1997.
  • Eytan Modiano, “Scheduling Packet Transmissions in A Multi-hop Packet Switched Network Based on Message Length, ” Lincoln Laboratory Technical Report number TR-1036, June, 1997.

Data Communication and Networking Research Topics

In the areas of networking and data communication, there are different fascinating project strategies emerging recently that align with the modern technologies. We suggest the following various advanced research topics that have the opportunity to dedicate aspects to the field meaningfully:

  • 5G and Beyond: Next-Generation Wireless Networks
  • By aiming at assisting the fast emerging number of devices, improving acceleration and minimizing latency, research the creation of 5G technologies and after them. For world-wide coverage, investigation can also discover the collaboration of 5G with satellite networks.
  • Quantum Networking
  • It is necessary to research the advancement of a quantum internet which provides unequaled safety aspects and the utility of quantum mechanics regulations, especially quantum key distribution (QKD) for safe interactions in networking.
  • Software-Defined Networking (SDN) and Network Function Virtualization (NFV)
  • Providing effective resource implementation, scalability and adaptability to explore in what way SDN and NFV can transform network handling and structure. For safety problems, virtual network function (VNF) deployment and resource scheduling, this study may target enhancement methods.
  • Blockchain for Network Security and Privacy
  • In improving user confidentiality and network protection like in defending DDoS threats, protecting routing and distributing DNS, analyze the utilization of blockchain technique. For networking situations, it contains possible appropriate topics like consensus systems and scalability solutions.
  • Edge Computing and IoT
  • To enhance performance, preserve bandwidth and decrease latency, this concentrates on the duty of edge computing in executing data nearer to IoT devices. This exploration can include edge-centered AI methods for practical decision-making, edge computing resource handling and optimal data caching ideas.
  • AI and ML for Network Optimization and Security
  • For security attack identification, predictive maintenance and network optimization, research how machine learning (ML) and artificial intelligence (AI) can be used. Configuration handling based on AI, abnormality finding and adjustable network routing are the topics that can be encompassed.
  • Energy-Efficient Networking
  • By supporting the renewability of ICT structure, discover plans for mitigating the power consumption of end-user devices, network architecture and data centers. Energy yielding approaches, eco-friendly data center patterns and energy-effective routing protocol for IoT devices are the concepts that can be enclosed in this study.
  • Wireless Sensor Networks (WSNs) for Environmental Monitoring
  • Considering difficulties such as data combination methods, low-energy performance and sensor node positioning and then exploring the deployment of WSNs, for practical tracking of ecological parameters.
  • Network Slicing for Multi-Service Support
  • To offer modified network services which align with different needs of authenticity, bandwidth and latency, determine the theory of network slicing in 5G networks and its possibility. Efficiency observation, separation systems and slice handling are the topics involved here.
  • Deep Learning for Traffic Classification and Network Management
  • For controlling network functions and categorizing network traffic, research the application of deep learning frameworks. The potential investigation fields can consist of predictive analytics for network traffic, quality of service (QoS) handling and automatic identification of application kinds.
  • Privacy-preserving Technologies in Networks
  • In settings such as big data and cloud computing specifically, aim at the creation and combination of privacy-preserving techniques in interaction networks like safe cross-party computation, zero-knowledge evidence and differential privacy.
  • Cross-layer Design for Wireless Communications
  • To increase the entire network dependability and efficacy by tackling the interconnection of layers in the protocol stack, discover the possibility of multi-layer pattern methods in enhancing wireless interaction protocols.

How do I select the topic for research and thesis on wireless communication or 5G networks? What are some of the latest topics on this field?

The process of choosing a suitable topic for thesis and research on 5G or wireless communication networks is a challenging task. We offer you a general procedural flow to make your decision on topics easily, along with a list of few advanced topics in this domain:

Steps to Choose a Research Topic:

  • Explore the Interests: The features of 5G or wireless communication networks which you get more curious about should be initially detected at the starting phase, because your interest for the concept will maintain your stimulation. The aspects can be anything like the IoT collaboration, the application of AI in network handling and the network security.
  • Literature Review: To interpret on-going directions, problems and fields of current study, carry-out an extensive survey of the latest technology, business documents and educational papers. For detecting spaces in evolving queries and expertise, this process will be beneficial.
  • Consider Relevance and Impact: You should select a topic which has the chance to influence the area as well as grasp educational and research significance. Analyze in what way your investigation can impact upcoming principles, support technological developments and overcome realistic issues.
  • Evaluate Feasibility: Based on your present knowledge, accessible materials and duration, assure that your selected topic is attainable. It is necessary to examine required tools, possible integration together with business or educational colleagues and the accessibility of data.
  • Consult with Advisors: Interact with your experts, mentors and staff in the area and explain your strategies. To detect possible difficulties in your exploration direction, adjust your topic and recommend advantageous resources, their proficiency and knowledge can be useful.

Latest Topics in Wireless Communication and 5G Networks:

  • Integration of AI and Machine Learning in 5G: Discover in what manner ML and AI can offer customized services in 5G networks, improve protection, enhance resource scheduling and optimize network functions.
  • Network Slicing for Diverse Applications: Using network slicing, research how various applications like mission-challenging interactions, IoT and high-speed mobile internet can be assisted by 5G networks.
  • Massive MIMO (Multiple Input Multiple Output) Technologies: For rising the strength and effectiveness of 5G networks, study the model, utilization and improvement of massive MIMO mechanisms.
  • Security Challenges in 5G Networks: Along with the secure handling of enormous IoT devices, confidentiality problems and verification risks, this topic targets on detecting and reducing novel safety susceptibilities which are presented by 5G techniques.
  • Energy Efficiency in 5G Networks: By concentrating on renewable performance, eco-friendly interaction methods and energy-effective network patterns, explore ideas for decreasing the power consumption of 5G networks.
  • Ultra-Reliable Low-Latency Communications (URLLC): Particularly for applications that need practical management and fast reaction like commercial automation and self-driving vehicles, research the techniques and protocols using URLLC in 5G.
  • 5G for Rural and Remote Connectivity: Overcome problems based on technology acceptance, cost-efficiency and architecture deployment by exploring countermeasures for expanding 5G coverage to distant and village regions.
  • Edge Computing in 5G Networks: The duty of edge computing in enhancing the efficacy of applications, mitigating latency and executing data nearer to the source in 5G networks can be investigated in this topic.
  • 5G and Beyond: Preparing for 6G: By discovering possible issues, techniques and applications in the creation of 6G networks, it anticipates the next generation of wireless communication after 5G.
  • 5G and IoT Integration: Aiming at the advancement of IoT services utilizing 5G abilities, increased connection choices and scalability issues and then researching the influence of 5G on the growth of IoT devices.
  • PHD Guidance
  • PHD PROJECTS UK
  • PHD ASSISTANCE IN BANGALORE
  • PHD Assistance
  • PHD In 3 Months
  • PHD Dissertation Help
  • PHD IN JAVA PROGRAMMING
  • PHD PROJECTS IN MATLAB
  • PHD PROJECTS IN RTOOL
  • PHD PROJECTS IN WEKA
  • PhD projects in computer networking
  • COMPUTER SCIENCE THESIS TOPICS FOR UNDERGRADUATES
  • PHD PROJECTS AUSTRALIA
  • PHD COMPANY
  • PhD THESIS STRUCTURE
  • PHD GUIDANCE HELP
  • PHD PROJECTS IN HADOOP
  • PHD PROJECTS IN OPENCV
  • PHD PROJECTS IN SCILAB
  • PHD PROJECTS IN WORDNET
  • NETWORKING PROJECTS FOR PHD
  • THESIS TOPICS FOR COMPUTER SCIENCE STUDENTS
  • IEEE JOURNALS IN COMPUTER SCIENCE
  • OPEN ACCESS JOURNALS IN COMPUTER SCIENCE
  • SCIENCE CITATION INDEX COMPUTER SCIENCE JOURNALS
  • SPRINGER JOURNALS IN COMPUTER SCIENCE
  • ELSEVIER JOURNALS IN COMPUTER SCIENCE
  • ACM JOURNALS IN COMPUTER SCIENCE
  • INTERNATIONAL JOURNALS FOR COMPUTER SCIENCE AND ENGINEERING
  • COMPUTER SCIENCE JOURNALS WITHOUT PUBLICATION FEE
  • SCIENCE CITATION INDEX EXPANDED JOURNALS LIST
  • THOMSON REUTERS INDEXED JOURNALS
  • DOAJ COMPUTER SCIENCE JOURNALS
  • SCOPUS INDEXED COMPUTER SCIENCE JOURNALS
  • SCI INDEXED COMPUTER SCIENCE JOURNALS
  • SPRINGER JOURNALS IN COMPUTER SCIENCE AND TECHNOLOGY
  • ISI INDEXED JOURNALS IN COMPUTER SCIENCE
  • PAID JOURNALS IN COMPUTER SCIENCE
  • NATIONAL JOURNALS IN COMPUTER SCIENCE AND ENGINEERING
  • MONTHLY JOURNALS IN COMPUTER SCIENCE
  • SCIMAGO JOURNALS LIST
  • THOMSON REUTERS INDEXED COMPUTER SCIENCE JOURNALS
  • RESEARCH PAPER FOR SALE
  • CHEAP PAPER WRITING SERVICE
  • RESEARCH PAPER ASSISTANCE
  • THESIS BUILDER
  • WRITING YOUR JOURNAL ARTICLE IN 12 WEEKS
  • WRITE MY PAPER FOR ME
  • PHD PAPER WRITING SERVICE
  • THESIS MAKER
  • THESIS HELPER
  • DISSERTATION HELP UK
  • DISSERTATION WRITERS UK
  • BUY DISSERTATION ONLINE
  • PHD THESIS WRITING SERVICES
  • DISSERTATION WRITING SERVICES UK
  • DISSERTATION WRITING HELP
  • PHD PROJECTS IN COMPUTER SCIENCE
  • DISSERTATION ASSISTANCE

IEEE Account

  • Change Username/Password
  • Update Address

Purchase Details

  • Payment Options
  • Order History
  • View Purchased Documents

Profile Information

  • Communications Preferences
  • Profession and Education
  • Technical Interests
  • US & Canada: +1 800 678 4333
  • Worldwide: +1 732 981 0060
  • Contact & Support
  • About IEEE Xplore
  • Accessibility
  • Terms of Use
  • Nondiscrimination Policy
  • Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest technical professional organization dedicated to advancing technology for the benefit of humanity. © Copyright 2024 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.

research topics in data communication and networking

loading page

  • Download ZIP
  • Download LaTeX
  • Download JATS XML
  • Track citations
  • Fork (make a copy)
  • Nurhazwani Zaidi ,
  • Mohammad Hafiz Mohd Yusof

Corresponding Author: [email protected]

research topics in data communication and networking

Data Communication and Networks

Proceedings of GUCON 2019

  • Conference proceedings
  • © 2020
  • Lakhmi C. Jain 0 ,
  • George A. Tsihrintzis 1 ,
  • Valentina E. Balas 2 ,
  • Dilip Kumar Sharma 3

Faculty of Engineering and IT, University of Technology Sydney, Broadway, Australia

You can also search for this editor in PubMed   Google Scholar

Department of Informatics, University of Piraeus, Piraeus, Greece

Department of automation and applied informatics, “aurel vlaicu” university of arad, arad, romania, department of computer engineering and applications, institute of engineering and technology, gla university, mathura, india.

  • Presents outstanding research papers presented at GUCON 2019
  • Discusses new findings in data communication and networks
  • Offers a valuable reference guide for researchers and practitioners in academia and industry

Part of the book series: Advances in Intelligent Systems and Computing (AISC, volume 1049)

15k Accesses

126 Citations

1 Altmetric

This is a preview of subscription content, log in via an institution to check access.

Access this book

Subscribe and save.

  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

About this book

Similar content being viewed by others.

research topics in data communication and networking

Technology trends in large-scale high-efficiency network computing

research topics in data communication and networking

Implementing Energy Service Automation Using Cloud Technologies and Public Communications Networks

research topics in data communication and networking

A Recent Study of Emerging Tools and Technologies Boosting Big Data Analytics

  • Cloud Computing
  • Computer Networks
  • Commutation
  • Data Mining
  • Big Data Analysis

Table of contents (24 papers)

Front matter, an ecc with probable secure and efficient approach on noncommutative cryptography.

  • Gautam Kumar, Hemraj Saini

Probability Prediction Using Improved Method in Delay-Tolerant Network

  • Pradeep Yadav, Manuj Mishra, C. P. Bhargava

Taxonomy of Cyberbullying Detection and Prediction Techniques in Online Social Networks

  • Madhura Vyawahare, Madhumita Chatterjee

A Formal Modeling Approach for QOS in MQTT Protocol

  • E. Archana, Akshay Rajeev, Aby Kuruvila, Revathi Narayankutty, Jinesh M. Kannimoola

Prediction of Gene Selection Features Using Improved Multi-objective Spotted Hyena Optimization Algorithm

  • S. Divya, Eranki L. N. Kiran, Madhu Sudana Rao, Pujitha Vemulapati

A Compressive Family Based Efficient Trust Routing Protocol (C-FETRP) for Maximizing the Lifetime of WSN

  • Nandoori Srikanth, Muktyala Siva Ganga Prasad

An Adaptive Genetic Co-relation Node Optimization Routing for Wireless Sensor Network

A novel hybrid user authentication scheme using cognitive ambiguous illusion images.

  • Sumaiya Dabeer, Mahira Ahmad, Mohammad Sarosh Umar, Muneeb Hasan Khan

Fault Classification in a Transmission Line Using Levenberg–Marquardt Algorithm Based Artificial Neural Network

  • Harkamaldeep Kaur, Manbir Kaur

IoT Botnet: The Largest Threat to the IoT Network

  • Smita Dange, Madhumita Chatterjee

Building a Trustworthy Ethical Approach to Cloud Computing

  • Ankita Sharma, Hema Banati

Weighted Frequent Itemset Mining Using OWA on Uncertain Transactional Database

  • Samar Wazir, M. M. Sufyan Beg, Tanvir Ahmad

Design of Customer Information Management System

  • Rohini Narayan, Gitanjali Mehta

Modeling Machine Learning Agent for Interaction Conversational System Using Max Entropy Approach in Natural Language Processing

  • Anil Kumar Negi, Syed Imtiyaz Hassan

Analysis of Energy Consumption in Dynamic Mobile Ad Hoc Networks

  • Indrani Das, Rabindra Nath Shaw, Sanjoy Das

Improved ITCA Method to Mitigate Network-Layer Attack in MANET

  • Nilesh R. Marathe, Subhash K. Shinde

Employing Machine Learning Models to Solve Uniform Random 3-SAT

  • Aditya Atkari, Nishant Dhargalkar, Hemali Angne

A Design and an Implementation of Forecast Sentence Extractor

  • Benyatip Srichareon, Suparerk Manitpornsut, Prapas Pongdamrong

Low Complexity Antenna Selection Scheme for Spatially Correlated Multiple Antenna Cognitive Radios

  • Sonali Chouhan, Tinamoni Taye

Editors and Affiliations

Lakhmi C. Jain

George A. Tsihrintzis

Valentina E. Balas

Dilip Kumar Sharma

About the editors

Bibliographic information.

Book Title : Data Communication and Networks

Book Subtitle : Proceedings of GUCON 2019

Editors : Lakhmi C. Jain, George A. Tsihrintzis, Valentina E. Balas, Dilip Kumar Sharma

Series Title : Advances in Intelligent Systems and Computing

DOI : https://doi.org/10.1007/978-981-15-0132-6

Publisher : Springer Singapore

eBook Packages : Engineering , Engineering (R0)

Copyright Information : Springer Nature Singapore Pte Ltd. 2020

Softcover ISBN : 978-981-15-0131-9 Published: 26 October 2019

eBook ISBN : 978-981-15-0132-6 Published: 25 October 2019

Series ISSN : 2194-5357

Series E-ISSN : 2194-5365

Edition Number : 1

Number of Pages : XXI, 342

Number of Illustrations : 39 b/w illustrations, 111 illustrations in colour

Topics : Communications Engineering, Networks , Mobile and Network Security , Data Mining and Knowledge Discovery , Big Data , Data Engineering

  • Publish with us

Policies and ethics

  • Find a journal
  • Track your research

Thank you for visiting nature.com. You are using a browser version with limited support for CSS. To obtain the best experience, we recommend you use a more up to date browser (or turn off compatibility mode in Internet Explorer). In the meantime, to ensure continued support, we are displaying the site without styles and JavaScript.

  • View all journals
  • Explore content
  • About the journal
  • Publish with us
  • Sign up for alerts
  • Review Article
  • Open access
  • Published: 27 September 2024

Mapping the main research themes in digital human resources

  • Laura García-Fernández 1 ,
  • Marta Ortiz-de-Urbina-Criado   ORCID: orcid.org/0000-0001-7527-6798 1 &
  • María-José García-López 1  

Humanities and Social Sciences Communications volume  11 , Article number:  1267 ( 2024 ) Cite this article

Metrics details

  • Business and management
  • Information systems and information technology

The COVID-19 pandemic sped up the digitalization process and revolutionized the world of the digital employee. And today, advances in artificial intelligence are having a major impact on the field of Digital HR. In that context, further literature review work is needed on the term Digital HR to complement previous studies and lay the foundation for more pioneering literature on this topic. Then, the aim of this paper is to provide a framework for organizing the main themes discussed in the pioneering literature on digital HR by answering the following research question: What is the knowledge structure of the research in the field of digital human resources? An adaptation of the PRISMA model is used to structure the research design. Applying a mixed methodology, this paper uses a bibliometric technique to identify the main topics studied in Digital HR. Subsequently, in-depth analysis and logical reasoning are applied and a model is proposed based on four questions (how, what, where, who) in order to understand and develop research on digital HR. The RQ4 Digital-HR model constitutes a useful tool in academic, practical, professional, and social contexts. It is worth highlighting the importance of the inclusion of artificial intelligence in the daily processes of a company, and therefore in the progress of the proposed research topic.

Similar content being viewed by others

research topics in data communication and networking

Impact of Artificial Intelligence on HR practices in the UAE

research topics in data communication and networking

Barriers and facilitators to utilizing digital health technologies by healthcare professionals

research topics in data communication and networking

A bibliometric analysis of knowledge mapping in Chinese education digitalization research from 2012 to 2022

Introduction.

The world is witnessing constant change due to digitalization and its effects on companies and their staff. The pandemic accelerated the adoption of digital technologies, which had an immense impact on all business sectors and brought about permanent changes in the workplace (Gkinko and Elbanna, 2023 ). Many organizations started working in hybrid mode, combining digital ways of working with the traditional ways of working prior to the pandemic. Moreover, the use of digital technologies and the acceptance of more agile and flexible procedures and rules have changed the way in which work is being done (Mićić and Mastilo, 2022 ).

In general, our daily lives have been altered by technological advances, one of the most innovative being the advances in artificial intelligence, which is transforming the way people carry out their daily activities of work, communication, and decision making (Duke, 2022 ). The concept of artificial intelligence seems to be relatively recent, and in many cases, its true meaning or significance is unclear. However, it was not until the 2010s that the AI paradigm was reconfigured to be based on the classification and storage of massive data (Cetindamar et al. 2024 ).

Human resource management has evolved over time. Twenty-five years ago, its main focus was on implementing practices that promoted the development of organizations. However, the need for organizations to adapt to more competitive environments has forced businesses to adjust the traditional business management model, moving from strategic management to a more sustainable management approach (Villajos et al. 2019 ). One of the main factors influencing the adaptation of human resources management to the new sustainable management model has been digitalization (Le et al. 2024 ). Through digitalization, all employees, professionals, managers and business leaders, who are key to making the necessary changes to increase workplace productivity, can see their tasks facilitated through this phenomenon. In this context, human resources management develops practices that promote the welfare of the employee and the company (Le et al. 2024 ). Thus, in recent years, and especially during the COVID-19 pandemic, Digital Human Resources (Digital HR) has received a great deal of attention, particularly regarding Digital Employees and Digital Leaders. Advances in artificial intelligence are having a major impact on the field of Digital HR (Gkinko and Elbanna, 2023 ). Although there are still few publications on the acceptance of the effects of AI on workers and how the current increase in the use of digital technologies affects the skills and expectations of the digital workforce (Alan, 2023 ; Cetindamar et al. 2024 ).

In the academic context, there has been a surge in the literature on Digital HR. However, literature review studies on this topic are lacking, with most of them focusing on analyzing the digital workplace phenomenon (De Moraes et al. 2024 ; Marsh et al. 2022 ; Mićić and Mastilo, 2022 ), digital employee experience (Moganadas and Goh, 2022 ), and workforce training in digital workplaces (Patino and Naffi, 2023 ). Only two reviews address the issue of Digital HR more generally. Theres and Strohmeier ( 2023 ) conducted a meta-analysis to analyze theories applied in research on Digital HRM adoption and proposed a unified theory. Alan ( 2023 ) performed a co-word analysis, considering Electronic Human Resources Management (e-HRM) as the main term, and analyzed previous literature found in the Web of Science (WoS) for the period of 2012–2022.

Thus, further literature review work is needed on the term Digital HR that analyzes the literature published before and during the pandemic to complement previous studies and lay the foundation for more pioneering literature on this topic. The interest in analyzing changes during the pandemic is motivated by the fact that adapting to the new context requires new human resources actions that are closely related to the phenomenon of digitalization. Digital HR is a constantly evolving topic, and pioneering studies are fundamental to understanding this new phenomenon. Today, there is also the challenge of appropriately and ethically adopting artificial intelligence in the context of human resources (Cetindamar et al. 2024 ; Gkinko and Elbanna, 2023 ). In the face of a novel topic, it is important to gain an overview of the aspects studied, to understand the changes that have occurred around the pandemic, and to provide a logical framework of analysis by which to explore such phenomena.

This paper aims to provide an overview of the pioneering research landscape in the field of digital HR, filling in some of the existing research gaps. As a complement to Alan’s ( 2023 ) work, this research will focus on the topic of ‘digital HR’ and conduct a co-word analysis to identify the main themes studied. Moreover, a second step, which is not usually included in previous literature reviews on this topic, will be carried out to detect the applications of digital human resources. To this end, a model based on questions (how, what, where, who) is proposed to facilitate the understanding and development of digital HR research.

Thus, the aim of this study is to provide a framework for the organization of the main themes that are discussed in the pioneering literature on Digital HR. The research question addressed is What is the knowledge structure of the research in the field of digital human resources? To answer this question, the Background section is developed and a mixed methodology is applied, adapting the PRISMA process. A bibliometric technique is used to identify the main topics studied in Digital HR. Subsequently, in-depth analysis and logical reasoning are applied to propose a model and some lines of future research. Finally, the Conclusion section contains theoretical and practical implications, the study limitations, and future lines of research.

This paper is an original contribution. Literature reviews, and more on rapidly developing novel topics, play an important role in advancing research as they help to synthesize and organize existing knowledge and identify areas or topics for future research. This article proposes an integrative review (Patriotta, 2020 ) that offers another voice to guide and write new articles on digital human resources. Authors such as Post et al. ( 2020 ) have also highlighted the importance of literature reviews as they can serve several purposes such as helping researchers understand the research topic, discerning important and under-examined areas and connecting research findings from disparate sources to create new perspectives and phenomena. Moreover, the topic “Digital HR” calls for looking for models that help connect academic research with the business world. As Markman ( 2022 ) proclaims, academia is challenged to develop research that addresses current problems affecting people, business and society to make the world a better place. In that line, the RQ4 Digital-HR model constitutes a useful tool for academic, practical, professional, and social contexts.

The global pandemic has accelerated digital transformation in every sense, and the rise of digital technology in the workplace is unstoppable (Kalischko and Riedl, 2021 ). Technology plays a vital role in our day-to-day lives. Digitization has arrived, yet what that means or entails at a work and/personal level remains unclear. According to Kraus et al. ( 2022 ), it is necessary to have a fundamental understanding of literature reviews as independent studies. Therefore, the key texts must be identified that lay the foundations of Digital Human Resources Management (Digital HRM) before undertaking a bibliometric study.

Main concepts

Few papers over the last decades have provided a clear, agreed-upon definition of the term “Digital Human Resources Management” that is shared by the scientific community. Most papers have only superficially addressed the whole social and economic context that affects the new confection of digital employee models. Moreover, papers have tended to narrow their focus to a specific aspect of human resources management (Alan, 2023 ; Costa et al. 2022 ), digital employee experience (Moganadas and Goh, 2022 ), and job performance (Kalischko and Riedl, 2021 ; Marsh et al. 2022 ), analyzing the situation individually and rather than as a whole. Therefore, the starting point for this study is to introduce some of the terms or concepts commonly used in previous literature on digital HR. Two widely used terms are “digital worker” and “digital employee”. A key resource in any company is the employee, the one who can contribute to superior and solid performance over time (Moganadas and Goh, 2022 ). For example, Fuchs ( 2014 ) defines digital employees as the workforce required for the existence, use, and application of digital media. Other studies define digital employees as those employees whose work is performed primarily using digital resources (Nelson, 2018 ). IBM ( 2024 ) states that “in the past, the term ‘digital worker’ described a human employee with digital skills, but more recently, the market has defined it as a category of software robots, which are trained to perform specific tasks or processes in partnership with their human colleagues.”

Another concept used is “digital workplace.” As management has adapted to new technologies, the workplace has also had to adapt. This new leadership style brings with it concepts such as flexibility, which in this context refers to the non-limitation of the workspace to a specific physical location. This new digital workplace refers to the set of technologies that employees use to perform their functions (Marsh, 2018 ) and includes, among others, the intranet, communication tools, e-mail, CRM, etc. It also refers to a set of procedures and rules that maximize productivity and improve collaboration, communication, and knowledge management (Mićić et al. 2022 ). Some researchers use the term “digital labor”, which initially referred to the unpaid work performed by consumers online during leisure time. However, this term is now used to describe all work in which digital technology plays a role (Jarrett, 2022 ). The term has also been used to describe employees who work independently, receiving low wages and no social security, in business models supported by digital platforms, such as Uber (Fumagalli et al. 2018 ), or to describe the workforce that uses other business models that are also based on digital platforms, such as Facebook or Google, and that capture information to transform it into big data (Fuchs and Sevignani, 2013 ).

In that context, another important concept is digital platform. Digital platforms are transforming almost every industry today (Reuver et al. 2018 ). They are continuously evolving and becoming increasingly complex. These digital platforms are the ones that facilitate online communities of consumers (Reuver et al. 2018 ). While there are several definitions of digital platforms that refer to the codes, software, and hardware of which they are composed, for this study the most suitable definition of digital platform would be the environment in which companies combine all the information available from their stakeholders to generate or co-create value (Karhu et al. 2018 ). According to Murati ( 2021 ), a digital platform is an open infrastructure that exercises a facilitator role or a high level of control and influence over providers and users.

The meeting point of each one of these concepts is the term Human Resource Management, which is understood as the processes that involve activities from recruitment to salary management and that are carried out simultaneously (Alan, 2023 ). All of these processes have been equipped with more technology and innovative methods over time. Thus, the concept has evolved to Digital Human Resource Management (HRM), understood as the set of software, hardware, and digital resources designed to automate the HR function (Jani et al. 2021 ; Marler and Parry, 2016 ), or in other words, to develop consistent, efficient and high-quality HR practices through the use of digital transformation and new technologies (Bondarouk and Brewster, 2016 ).

Previous literature reviews

Previous literature reviews established a set of definitions that, despite using common concepts, have left nuances that have yet to be fully addressed in subsequent works. Most of the work that reviews previous literature has focused on studying digital workplaces. Mićić and Mastilo ( 2022 ) conducted a systematic literature review on the digital transformation of the workplace and employees’ workplace preferences. The search terms used were “digital workplace”, “COVID-19”, and “innovation”, and the search was limited to English language papers published after 2010. The benefits of digital workplace transformation are analyzed and the critical success factors and significant challenges are identified.

Marsh et al. ( 2022 ) studied the application of digital technologies in the workplace with a particular focus on their dark side. They conducted an integrative literature review and limited the search to papers published between January 2007 and June 2020 that were written in English and carried out in Western countries only (in the United States, Europe, Canada, Australia, Latin America, and New Zealand). De Moraes et al. ( 2024 ) conducted a systematic review of the literature on the design of digital workplaces. Their main results include a definition of digital workplace and a four-phase model with guidelines for designing digital workplaces. Patino and Naffi ( 2023 ) conducted a systematic review of training approaches and resources for workforce development in digital workplaces. Using the PRISMA model, they analyzed articles published between 2020 and 2022. Their paper offers research-based perspectives and recommendations for employee training in highly digitalized workplaces.

Another aspect that has been studied is the experience of the digital worker. Moganadas and Goh ( 2022 ) discuss the concept of digital employee experience (DEX). They conducted a comprehensive literature review on DEX by analyzing the content of academic publications and professional reports. They used the Scopus and Google Scholar databases to identify “DEX” or “digital employee experience” in their title, abstract, and keywords and found 17 articles between 2016 and 2022. To complement these papers, they included grey literature to identify studies that addressed a similar topic, such as digital transformation, digital workplace, and employee experience.

Finally, a few papers have reviewed the literature on human resource management in a digital environment. Theres and Strohmeier ( 2023 ) analyzed the phenomenon of digital HRM. In their paper, they present an overview of the theories applied in digital HRM adoption research and propose a unified theory. To test their theory, they performed a combination of meta-analysis and structural equation modelling. Alan ( 2023 ) presented a systematic bibliometric analysis of electronic human resource management (e-HRM) by conducting a literature search in the Web of Science (WoS) for the period of 2012–2022.

Methodology

Figure 1 presents the methodological process used in this study. The methodological design used includes two parts. In the first, a multi-step process has been followed to perform the bibliometric analysis: sample selection, filtering of documents and keywords, and co-word analysis. In the second, a reflexive analysis was carried out. To facilitate the understanding of the process followed, the PRISMA 2020 statement has been adapted, which has been designed primarily for systematic reviews of studies (Moher et al. 2010 ; Page et al. 2021 ). The adaptation of the PRISMA process provides a more transparent view of the methodology used and the analyses carried out.

figure 1

Own elaboration based on the PRISMA model.

The Scopus database was used. There is an open debate regarding whether Scopus or WoS is superior. Both have advantages and disadvantages (Stahlschmidt and Stephen, 2020 ). The Scopus database was chosen for this paper because it offered a larger sample of documents than did WoS. Although the research on Digital HR began over 35 years ago, most of the articles have been published in the last three years, demonstrating the impact of the COVID-19 pandemic on this topic. Until the year 2016, contributions were sporadic, and it is not until a year later, in 2017, that the research begins to approach 25 articles per year. Of the total of articles (347), 56% (196) were published between 2020 and 2022, with 2021 being the most important year, when a total of 82 articles (25%) were published.

A co-word analysis in conjunction with the SciMat program was used to identify the various themes covered in the literature on Digital HR (Cobo et al. 2012 ). Of the many tools that enable co-word analysis, SciMat was chosen for its ability to carry out the analysis with simplicity and rigor. Moral-Muñoz et al. ( 2019 ; 2020 ) describe the various tools that are available for bibliometric analysis and comment on SciMat as being a valid tool for co-word analysis. SciMat was suitable for achieving the objective of this paper because it analyzes the keywords of selected articles and calculates the strategic diagrams and networks for each thematic group. Moreover, SciMat incorporates all the necessary elements (methods, algorithms, and measurements) for performing a co-word analysis and obtaining its visualizations (Cobo et al. 2012 ).

Regarding the strategic diagram, centrality and density are calculated for each thematic group (Cobo et al. 2018 ). Centrality is a measure of the importance of a theme in the development of a field of knowledge. Density reflects the strength of a network’s internal relationships, thus identifying the level of development of that theme. The strategic diagram classifies the themes into four groups (Cobo et al. 2018 ). In the upper-right quadrant are the motor themes, which comprise themes that have strong centrality and high density. In the upper-left quadrant are the well-developed and/or isolated themes. The themes in the lower-left quadrant are presented as emerging or disappearing themes, while in the lower-right quadrant are themes that are considered basic and transversal themes.

This section presents the results of the co-word analysis. The bibliometric technique is suitable for identifying the knowledge structure of a research topic. Given the volume of articles published between 2020 and 2022, two periods of analysis were carried out to compare the networks that emerged prior to and after the COVID-19 pandemic. Figure 2 shows the evolution of all the topics mentioned, their typology, and how, depending on the period, they transform into a new topic.

figure 2

Results from SciMat, diagram composed of themes by number of documents for all the periods.

Table 1 presents the evolution that Digital HR research has experienced during these years.

Main themes studied in Digital HR

Regarding the total period (1984–2022), previous research focused on “digital workplace” and “digital platform” and “digital employee” as the motor themes. “Digital labor” appears as an emerging topic and as something remarkable. Despite not being connected to the human resources area, this entire digitization process is linked to the topic “enterprise bots”, a concept that had previously been highly developed in scientific fields. During the pre-COVID period (1984–2019), the motor theme was the “digital workplace”. During the COVID period (2020–2022), the motor themes were “digital employee” and “digital workplace”. Lastly, the emerging theme for all the periods is “digital labor”.

During the first period (1984–2019), only one theme, “digital workplace”, is positioned as a motor theme. It makes sense that after the 4 th industrial revolution, developed between 1950 and 1970, a study period would begin regarding how this digitization has affected the workspaces as well as how to continue innovating and improving them. Companies have needed workplaces to be transformed from a traditional perspective to a digital one (Colbert et al. 2016 ; Kaarst-Brown et al. 2018 ), since this change is key to organizational success (Colbert et al. 2016 , Köffer, 2015 ).

In the 2020–2022 period, two additional topics to those appearing in the previous period emerge. These are “digital employee” and “digital labor”, positioned as a motor and an emerging theme, respectively. These topics correlate with what occurred during the pandemic, which forced the digitalization of all types of situations. As a result, the research on this area has focused on the employee and, above all, the digitization of work that, as mentioned, appears as an emerging topic.

Based on these results and for the completion of the analyses, a manually and logical regrouping of themes was conducted in the SciMat program, and another strategic diagram was identified. Figure 3 , which presents the strategic diagram obtained from this new analysis, shows that the motor themes are “digital platform” and “workplace”. “Manufacturing”, “digital employee”, and “social media” are well-developed themes. “Digital”, “learning”, and “labor” are positioned as basic themes. Finally, the emerging theme is “artificial intelligence”. A logical knowledge structure of the study topics can be observed. On the one hand, what emerges are the themes related to the more digital aspect of work, namely “digital”, “digital platform”, and “digital employee”. On the other hand, there are items that refer to the more physical aspect, “labor” and “workplace”. Tangential to the most digital aspect linked to work is the communication channel or media used at work, “social media”. In turn, in the main sector where the research is applied or where the literature has further explored these issues, the theme of “manufacturing” is also well defined.

figure 3

Results from SciMat, diagram composed of themes by a number of documents for all the periods.

Also evident in the diagram is the channel through which employees can progress in the work environment, through “learning”, a Human Resources practice that has been developed for some time but has become more crucial in recent years. Learning is the key to employees acquiring digital competencies and feeling comfortable in digital work environments. Finally, as an emerging topic, is everything related to “artificial intelligence”. This topic, of relatively recent creation, has all the works published in the year 2022 or later, and is creating a highly critical space in the business environment, and in this particular case, in everything related to Human Resources and how to implement it in departmental processes.

Thematic networks in Digital HR

It is interesting to know the thematic networks in which the most significant keyword (the one with the highest centrality) is placed at the center. The size of each node represents the number of documents containing that word, and the thickness of the line indicates the strength of the association between those topics.

Digital platform

Analysis of the “Digital Platform” subnetwork (Fig. 4 ) for the period 1984–2022, reveals four documents and a wide network of terms that correlate with each other. The most notable relationships are those related to health care. However, within our scope, there are several studies that focus on the use of digital platforms as a means of offering work in the “gig economy.” Taylor et al. ( 2017 ) define the concept of Gig Economy as the use of applications or platforms for work.

figure 4

Results from SciMat cluster network for the digital platform.

The analysis also revealed the importance of collaborative work for the improvement of digital platforms, as shown through the connections between the terms “collaborative designs” and “co-creation”. The research also showed two important advances in what has been studied in recent years: the flexibility that this type of work facilitates (Soriano and Cabanes, 2020 ) and how these new jobs can change the lifestyle of digital employees (Graham et al. 2017 ).

Digital workplace

The “Digital workplace” network (Fig. 5 ) for the period 1984–2022 includes six documents and shows that the most important keywords in the cluster are “digital transformation” and “artificial intelligence”. Again, it is crucial for this network to talk about “collaboration”, as well as “cross-functional teams” and their “dynamic capabilities” that play a special role in developing the digital workplace. As Selimović et al. ( 2021 ) posit, the inclusion of the employee in the decisions on digital transformation is a key to its success. Moreover, the use of artificial intelligence, through the “chatbots” makes improvement in the workplace possible (Cetindamar et al. 2024 ). In both cases, the focus is placed on the inclusion of the employee as a key part of these processes. This demonstrates a strong relationship between digital and emotions in the cluster, since understanding how the use of technology affects employees’ emotions (Gkinko and Elbanna, 2022 ) is one of the most relevant topics in the current research.

figure 5

Results from SciMat cluster network for the digital workplace.

The analysis of the “Digital workplace” network (Fig. 6 ) for the period 1984–2019, which contains 15 documents, reveals the strong presence of terms related to a collaborative work environment, such as “collaboration”, “cloud”, “cloud computing”; or even advancing further in the collaboration itself, it becomes necessary to talk about “digital platforms” or “crowdsourcing”, as means for it, being the key tools for developing the digital workplace (White, 2012 ; Attaran et al. 2019 ). Indeed, the most remarkable aspect of the network is the strong connection between “cloud computing” and “mobile working”. It must be considered that during these years, prior to the COVID-19 pandemic, the now-standardized option of mobile working was merely a practice applied by a few companies. Thus, it makes sense that during these years of strong digitization, research focuses on it. There is also one term, “artificial intelligence” (here also mentioned as “social software”), that researchers start to investigate during these years, since its use in the digital workplace is continuing to increase (Martensen et al. 2016 ) and, as could be seen throughout the paper, it will also become of vast importance for other networks.

figure 6

For the last years (2020–2022), “Digital workplace” network (Fig. 6 ) contains the highest number of documents (16) and shows two remarkable themes “digital transformation” and “artificial intelligence”. In the figure can be seen a triangle formed by “emotions”, “emotions at work”, and “chatbot”, as employee users experience a connection emotion when using artificial intelligence (Gkinko and Elbanna, 2022 ), and there is an effort to understand how employees will accept these new systems in the enterprise context (Brachten et al. 2021 ). Moreover, in these recent years, the changes that companies must make to achieve the digitalization of the workplaces takes on a special relevance. Thus, it is not surprising that the investigation is linked to “organizational change” and “technology-adoption”. It should not be overlooked that none of these changes would be possible without including the “employees” in said decisions (Cetindamar et al. 2024 ).

There is a topic that remains throughout the analysis: “artificial intelligence” (Fig. 6 ). However, there is a positive evolution between the topics analyzed prior to the pandemic and those analyzed after it. In the first period (1984–2022), the topics were focused on how the workplace should be or what it should contain and how it should be digitized, as well as on platforms and software and everything related to the cloud. However, during the pandemic period, some changes were perceived, with the introduction of themes arising from having been forced to implement the digital work modality. These topics include technostress, emotions, and employees, as well as everything related to organizational change.

Digital employee

The “Digital employee” network (Fig. 7 ) for the period 1984–2022 contains 10 documents and shows, as previously mentioned, the relevance of the pandemic in this research. In this sense, it is crucial to understand how this situation affected the employee, the work itself, and the life experience of employees (Muszyński et al. 2021 ). Above all, it shows a strong connection between the concepts related to “Robotic Process Automation” (RPA), “digital automation process”, and “software robot”, as a means to increasing productivity in a company, leaving the routine tasks to RPA and assigning employees to perform more difficult tasks (Choi et al. 2021 ). Clearly, it is crucial to talk about the “digital competencies” that employees have or need to acquire to be included in the “new work” that globalization is forcing us to implement.

figure 7

Results from SciMat cluster network for digital employees.

The “Digital employee” network, for the last years (2020–2022) (Fig. 7 ), with eight documents, shows that there have been no changes in recent years compared to what was already being studied. The only difference is that the research in these years does not focus on the new types of work, implemented post-pandemic, but studies how to improve the implementation of RPA (Costa et al. 2022 ) to achieve better economic results and an improved digital employee experience.

Digital labor

The “Digital labor” network (Fig. 8 ) for the years 1984–2022, contains nine documents and shows a star-shaped network characterized by the presence of keywords that only correlate with the cluster topic. The main theme of the cluster is the work itself with its main versions, with research on the best type of work being very common (Babapour Chafi et al. 2022 ): office work or digital work (commonly called digital nomadism). There is also an important connection with the information society.

figure 8

Results from SciMat cluster network for digital labor.

“Digital Labor”, for the last years (2020–2022), provides six documents (Fig. 8 ). Studies related to the “gig economy” and the types of jobs related to digital platforms proliferate during this period. In addition, once the pandemic period was over, it was expected that employees would return to office work. Thus, there arises a need to understand which work model (remote, face-to-face, or hybrid) is more productive and which is more valued by the employee (Babapour Chafi et al. 2022 ).

A comparison of studies prior to the pandemic with those of recent years reveals that initially there were several issues related to digital work, whereas in recent years these have been reduced to two issues: office work or work through digital platforms.

Enterprise bots

The “Enterprise bots” network for the period 1984–2022 (Fig. 9 ) contains two documents that co-relate two concepts, virtual assistants and virtual agents, as being crucial to understanding the differences between them, and above all, to understanding the differences in use between the individual and the business context (Stieglitz et al. 2018 ). The focus was therefore on teaching an employer how to effectively introduce these systems in the company (Brachten et al. 2021 ).

figure 9

Results from SciMat cluster network for enterprise bots.

The results of this study complement those of previous literature review studies. Alan ( 2023 ) focused on the term Electronic Human Resources Management (e-HRM) and conducted a review of the literature included in WoS from 2012 to 2022. Our study focused on the term “digital human resources” and used the Scopus database. Our study also included pioneering literature up to 2022 and an analysis of the differences between the pre-pandemic period (1984 to 2019) and the peak years of the pandemic (2020–2022).

Alan ( 2023 ) categorizes the research on this topic into three groups: the theoretical studies and theories used in the studies reviewed, empirical qualitative studies, and empirical quantitative studies. Alan ( 2023 ) presents summary tables for each category that include following information: related theoretical framework, related terms, studies, typology of study, aim of the study, and the main findings and propositions. In a complementary way, this current paper presents the studied themes and classifies them into four groups according to the strategic diagram and analyses the networks for each thematic group. Additionally, based on the results obtained in the previous section, a process of analysis and reflection was carried out to establish the roadmap of topics studied and to define the emerging and future topics. Four main research questions (how, what, where, who) are considered to propose a model (Fig. 10 ).

figure 10

Own elaboration.

The RQ4 Digital-HR model presents four fundamental questions for understanding and developing research on digital HR -Research Questions for Digital HR.

The basis of the proposed model (Fig. 10 ) refers to “where” to apply it. The results of the analysis show that there is a sector where deep research on the subject has already been carried out, the manufacturing sector. However, the research should not stop there. Future research should take this model to other sectors of much greater complexity and scope, such as the service sector.

The pillars that support the model, “the what,” are on two levels: the advances in the digitalization of work on the one hand and, on the other hand, all the learning that a company can guarantee to its employees and that employees are able to assimilate. Clearly, the cross-cutting issue, “the who,” is the digital employee, the workforce member that drives the change, the one who is able to implement any Human Resources practice, and therefore the one who is able to assimilate business-driven change.

The roof of the model is “the how.” The implementation of all the changes we are forced to make is only possible through the implementation and improvement of three items in our daily processes: firstly, the digital platforms that we use every day at work, secondly, the management of information through the channels provided by the company, and thirdly—and most importantly—the inclusion of artificial intelligence in all our processes, as a means of improving productivity. This technology is transforming, and revolutionizing, the future of workspaces to make them more productive (Gkinko and Elbanna 2022 ), but again studies on the subject do not address how to accomplish this. Most of the texts reviewed on the subject focus on investigating some aspect of the implementation of artificial intelligence systems and their errors (Costa et al. 2022 ) or on employees’ acceptance of or trust in such technology (Gkinko and Elbanna, 2023 ). However, the work of Gkinko and Elbanna ( 2022 ) offers a starting point for how to incorporate this technology into a company, since the emotions of employees need to be taken into account when such tools are being created in order to facilitate their inclusion in day-to-day activities.

This makes it vital to focus the research on Digital HR, which requires researchers to collaborate to determine the what, where, how, and who. Based on the questions in the model, a further step has been taken to identify the aspects that would be interesting to analyze in future work to answer each of these fundamental questions.

WHAT: In reference to this, it is important to discover what digital processes should be introduced in our daily lives, what learning tools will help us to channel digitization, and what new labor trends can be found in the post-COVID stage.

WHERE: Future research should focus on analyzing what kind of workspaces exist in the labor market. This first line of research will undoubtedly lead towards the different sectors of activity, so it is also important to see what we know about the different sectors and their relationship with Digital HR, especially in the service sector, since globally it is the most present sector of activity.

HOW: Research should continue to determine how to do this and, as broken down in the table, it is important to address how to adopt digital platforms in the work environment, how to adapt existing social networks to the business context, and how to apply new artificial intelligence models.

WHO: As mentioned in this paper, digital HR is a transversal entity in all these lines of research. However, it is not left out of the future lines of research since it is essential to understand who this digital HR includes.

Finally, based on the results of this study (thematic groups) and the proposed model (questions), Table 2 presents a proposal for future research lines and questions.

The proposed model revolves around four fundamental research questions (Fig. 10 ). The importance of researchers developing the ability to formulate questions has an epistemological background expressed by Bachelard ( 1982 , p. 16) as ‘for a scientific spirit all knowledge is an answer to a question. If there was no question, there can be no scientific knowledge’. It should be noted that the quality of the questions asked is closely related to the prior knowledge they have about a given topic (Neber and Anton, 2008 ). Systematic questioning about different phenomena fosters meaningful learning by drawing on prior knowledge in a non-arbitrary and non-literal way (Moreira, 2000 ). Furthermore, knowing the background of a subject facilitates scientific modelling, an activity inherent to science, which can be understood as a process of constructing models for the purpose of apprehending reality (Giere, 1988 ) and providing answers to questions formulated about real facts or assumptions (Halloun, 1996 ). The model presented in Fig. 10 and developed in Table 2 , helps to logically order the themes studied in the previous literature and to propose emerging and current themes of great interest for the development of the literature on digital HR.

In addition, the model helps to sort out what company should focus on meeting the needs of its employees without leaving its own needs behind, first the basis, then the pillars and finally the roof. In this regard, it is important to start managing the workers’ workplaces to adapt them to the environment. Subsequently, the training needs of employees must be addressed, along with the necessary adaptations to enable them to function digitally. Thirdly, companies must develop internal and external communication systems that allow them to be in contact with all their stakeholders. Only having developed these points will be able to focus on meeting current social demands and introducing artificial intelligence in their daily work.

Therefore, if companies’ human resources departments understand this model and its order, will be able to act effectively and thus be more ethical and sustainable. On the other hand, acting in an inverted order will leave some of the pillars of the Triple Bottom Line uncovered, with the risks that this entails. The Triple Bottom Line (triple P´s) model is a model that calls for corporate commitment to measure its social (Person), environmental (Planet), and financial (Profit) impact. This is why it becomes necessary to have a human resources management model adapted to the current and changing context of the organization (Kramar, 2014 ).

In turn, for the employee, the implementation of a model will help them to prioritize their needs to be covered by the company so that, once managed, they can lead to a higher and better performance and thus achieve a high level of well-being at work. Ruiz-Palomino et al. ( 2019 ) explain that a good way to improve a company productivity is to promote corporate wellness and entrepreneurship.

Conclusions

This paper has answered the question What is the knowledge structure of pioneering research in the field of digital human resources? A mixed methodology was used to identify the main topics studied in Digital HR and to propose a model and some future research lines and questions.

This article presents an integrative review to generate ordered knowledge spaces, which as Patriotta ( 2020 ) explains serves to ‘put boundaries around an existing area of research in order to provide an organized sample of what is available and build a platform for future research’ (p. 1274).

Implications

Theoretical implications.

In terms of theoretical implications, this paper highlights the interest of extending current research to concretely define what the digitalization of work means as well as its implications and requirements. This will enable the discovery or even the proposal of new digital work models, incorporating those positions redefined as a result of the incorporation of artificial intelligence and thus make it possible to delimit digital HR. On the other hand, it is noted that the incorporation of new trends in the market must be reflected in the teaching/learning methods to achieve greater professionalization. In turn, a company will become the protagonist in designing these new training processes that are linked to its specific professional activity and the profile of its employees. On the other hand, emphasis can be placed on studying how to increase productivity through the application of artificial intelligence in routine tasks.

In addition, based on the proposed model, an expansion of research on Digital HR human resources is proposed, incorporating new lines and research questions, which will lead to a new categorization of workplaces according to their capacity to adopt digital models. This will lay the foundation for a new labor framework and the development of innovative capabilities in this regard. This broadening of research can be related to the development of thematic lines and professional sectors, especially in the service sector, thus accommodating the most important sector for the European economy. Future research can consider the development of new TAM (Technology Acceptance Model) models to measure the adoption of digital technologies in digital work environments. Social networks used in the work environment can also be investigated to detect those that best help to channel the processes of labor digitalization.

Practical implications

In terms of practical implications, the results obtained and the proposed model can be used to encourage the application of new technologies in the work environment; guarantee employees digital learning processes to increase productivity, facilitating this new learning process; and create policies and standards that include artificial intelligence and social networks in the business environment, thus standardizing their proper use to generate greater productivity and economic results. New and innovative workspaces can also be developed in order to integrate the improvements derived from digitalization and artificial intelligence. Information channels can also be developed to connect the new processes with stakeholders and adapt the work activity to the new demand of employees and the market, thus including, from its conception, digital natives in the entire process.

Social Implications

The results also have social implications. In this sense, the study of the digitization of human resources helps to adapt the usual performance of employees to the inclusion of new technologies in the business environment and to involve employees in training processes to promote professional and labor development. In turn, it can be used to involve employees in the development of new workspaces to maximize productivity, for the implementation of new work models designed by the company and the use of social networks as a means of labor communication. As a corollary, artificial intelligence can be considered as a tool to improve productivity, reducing the volume of monotonous or routine tasks and reinforcing those in which only the employee can provide real value.

Limitations and future research lines

The authors acknowledge the limitations of the methodology used in this study and call for further research to expand our understanding of the topic. Future studies could complement the co-word analysis with other bibliometric techniques such as co-citation analysis and develop theoretical and empirical models on the applications of digital human resources.

Data availability

Documents that support the findings of this study can be consulted in the Scopus database by following the search procedure indicated in the methodology section.

Alan H (2023) A systematic bibliometric analysis on the current digital human resources management studies and directions for future research. J Chin Hum Resour Manag 14:38–59. https://doi.org/10.47297/wspchrmWSP2040-800502.20231401

Article   Google Scholar  

Attaran M, Attaran S, Kirkland D (2019) The need for digital workplace: increasing workforce productivity in the information age. Int J Enterp Inf Syst 15:1–23. https://doi.org/10.4018/IJEIS.2019010101

Babapour Chafi M, Hultberg A, Bozic Yams N (2022) Post-Pandemic office work: perceived challenges and opportunities for a sustainable work environment. Sustainability 14(1):294. https://doi.org/10.3390/su14010294

Bachelard G (1982) La formación del espíritu científico. Siglo XXI Editores, México

Google Scholar  

Bondarouk T, Brewster C (2016) Conceptualising the future of HRM and technology research. Int J Hum Resour Man 27(21):2652–2671. https://doi.org/10.1080/09585192.2016.1232296

Brachten F, Kissmer T, Stieglitz S (2021) The acceptance of chatbots in an enterprise context–A survey study. Int J Inf Manage 60. https://doi.org/10.1016/j.ijinfomgt.2021.102375

Cetindamar D, Kitto K, Wu M, Zhang Y, Abedin B, Knight S (2024) Explaining AI literacy of employees at digital workplaces. IEEE Trans Eng Manag 71:810–823. https://doi.org/10.1109/TEM.2021.3138503

Choi D, R’bigui H, Cho C (2021) Robotic process automation implementation challenges. In: Pattnaik PK, Sain M, Al-Absi AA, Kumar P (eds) Proceedings of International Conference on Smart Computing and Cyber Security. SMARTCYBER 2020. Lecture Notes in Networks and Systems vol 149. Springer, Singapore. https://doi.org/10.1007/978-981-15-7990-5_29

Cobo MJ, López-Herrera AG, Herrera-Viedma E, Herrera F (2012) SciMAT: a new science mapping analysis software tool. J Am Soc Inf Sci Tec 63(8):1609–1630. https://doi.org/10.1002/asi.22688

Cobo MJ, Jürgens B, Herrero-Solana V, Martínez MA, Herrera-Viedma E (2018) Industry 4.0: a perspective based on bibliometric analysis. Procedia Comput Sci 139:364–371. https://doi.org/10.1016/j.procs.2018.10.278

Colbert A, Yee N, George G (2016) The digital workforce and the workplace of the future. Acad Manag J 59(3):731–739. https://doi.org/10.5465/amj.2016.4003

Costa D, Mamede H, Mira da Silva M (2022) Robotic process automation (RPA) adoption: a systematic literature review. Eng Manag Prod Serv 14:1–12. https://doi.org/10.2478/emj-2022-0012

De Moraes CR, da Cunha PR, Ramos I (2024) Designing digital workplaces: a four-phase iterative approach with guidelines concerning virtuality and enterprise integration obituaries. Pac Asia J Assoc Inf 16(1):74–98. https://aisel.aisnet.org/pajais/vol16/iss1/4 . Available at Accessed 03 June 20

Duke B (2022) 24/7 Digital work-based spy: the effects of technological panopticism on workers in the digital age. J Labor Soc 25(4):520–558. https://doi.org/10.1163/24714607-bja10068

Fuchs C, Sevignani S (2013) What is digital labour? what is digital work? what’s their difference? and why do these questions matter for understanding social media? TripleC-Commun Capit 11 (2). https://doi.org/10.31269/triplec.v11i2.461

Fuchs C (2014) Digital labour and Karl Marx. Routledge, New York

Book   Google Scholar  

Fumagalli A, Lucarelli S, Musolino E, Rocchi G (2018) Digital labour in the platform economy: the case of Facebook. Sustainability 10(6):1757. https://doi.org/10.3390/su10061757

Giere R (1988) Explaining science: a cognitive approach. Chicago: University of Chicago

Gkinko L, Elbanna A (2022) Hope, tolerance and empathy: employees’ emotions when using an AI-enabled chatbot in a digitized workplace. Inf Technol Peopl 35(6):1714–1743. https://doi.org/10.1108/ITP-04-2021-0328

Gkinko L, Elbanna A (2023) Designing trust: the formation of employees’ trust in conversational AI in the digital workplace. J Bus Res 158. https://doi.org/10.1016/j.jbusres.2023.113707

Graham M, Hjorth I, Lehdonvirta V (2017) Digital labour and development: impacts of global digital labour platforms and the gig economy on worker livelihoods. Transf -Lond 23(2):135–162. https://doi.org/10.1177/1024258916687250

Halloun I (1996) Schematic modeling for meaningful learning of physics. J Res Sci Teach 33(9):1019–1041

IBM (2024). The IBM register: https://www.ibm.com/topics/digital-worker Accesed on January 2024

Jani A, Muduli A, Kishore K (2021) Human resource transformation in India: examining the role digital human resource technology and human resource role. Int J Organ Anal 31(4):959–972. https://doi.org/10.1108/IJOA-08-2021-2886

Jarrett K (2022) Digital Labor. Cambridge, UK

Kaarst-Brown M, Quesenberry J, Niederman F, Weitzel T (2018) Special issue editorial: new approaches to optimizing the digital workplace. Mis Q Exec 18(1):9–14. https://aisel.aisnet.org/misqe/vol18/iss1/3

Kalischko T, Riedl R (2021) Electronic performance monitoring in the digital workplace: conceptualization, review of effects and moderators, and future research opportunities. Front Psychol 12:633031. https://doi.org/10.3389/fpsyg.2021.633031

Article   PubMed   PubMed Central   Google Scholar  

Karhu K, Gustafsson R, Lyytinen K (2018) Exploiting and defending open digital platforms with boundary resources: android’s five platform forks. Inf Syst Res 29(2):479–497. https://doi.org/10.1287/isre.2018.0786

Köffer S (2015) Designing the digital workplace of the future–what scholars recommend to practitioners. ICIS 2015 Proceedings. 4. https://aisel.aisnet.org/icis2015/proceedings/PracticeResearch/4

Kramar R (2014) Beyond strategic human resource management: is sustainable human resource management the next approach? Int J Hum Resour Man 25(8):1069–1089. https://doi.org/10.1080/09585192.2013.816863

Kraus S, Breier M, Lim WM (2022) Literature reviews as independent studies: guidelines for academic practice. Rev Manag Sci 16:2577–2595. https://doi.org/10.1007/s11846-022-00588-8

Le KBQ, Sajtos L, Kunz WH, Fernandez KV (2024) The Future of Work: Understanding the Effectiveness of Collaboration Between Human and Digital Employees in Service. J Serv Res 0(0). https://doi.org/10.1177/10946705241229419

Markman GD (2022) Will your study make the world a better place? J Manag Stud 59(6):1597–1603. https://doi.org/10.1111/joms.12843

Marler J, Parry E (2016) Human resource management, strategic involvement and e-HRM technology. Int J Hum Resour Man 27(19):2233–2253. https://doi.org/10.1080/09585192.2015.1091980

Marsh E (2018) Understanding the effect of digital literacy on employees’ digital workplace continuance intentions and individual performance. Int J Digital Lit Digital Competence 9(2):15–33. https://doi.org/10.4018/IJDLDC.2018040102

Marsh E, Pérez-Vallejos E, Spence E (2022) The digital workplace and its dark side: An integrative review. Comput Hum Behav 128. https://doi.org/10.1016/j.chb.2021.107118

Martensen M, Ryschka S, Blesik T, Bick M (2016) Collaboration in the consulting industry: Analyzing differences in the professional use of social software. Bus Process Manag J 22(4):693–711. https://doi.org/10.1108/BPMJ-06-2015-0093

Mićić L, Khamooshi H, Rakovic L, Matkovic P (2022) Defining the digital workplace: a systematic literature review. Strateg Manag 27(2):29–43. https://doi.org/10.5937/straman2200010m

Mićić L, Mastilo Z (2022) Digital workplace transformation: innovative approach after Covid-19 pandemic. Economics 10(2):63–76. https://doi.org/10.2478/eoik-2022-0014

Moganadas SR, Goh GGG (2022) Digital employee experience constructs and measurement framework: a review and synthesis. Int J Technol 13(5):999–1012. https://doi.org/10.14716/ijtech.v13i5.5830

Moher D, Liberati A, Tetzlaff J, Altman DG, Prisma Group (2010) Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement. Int J Surg 8(5):336–341. https://doi.org/10.1136/bmj.b2535

Article   PubMed   Google Scholar  

Moral-Muñoz JA, López-Herrera AG, Herrera-Viedma E, Cobo MJ (2019) Science mapping analysis software tools: a review. In: Glänzel W, Moed HF, Schmoch U, Thelwall M (eds) Springer Handbook of Science and Technology Indicators. Springer Handbooks. Springer, Cham. https://doi.org/10.1007/978-3-030-02511-3_7

Moral-Muñoz JA, Herrera-Viedma E, Santisteban-Espejo A, Cobo MJ (2020) Software tools for conducting bibliometric analysis in science: An up-to-date review. Prof Info 29(1). https://doi.org/10.3145/epi.2020.ene.03

Moreira MA (2000) Aprendizaje significativo: teoría y práctica. Visor, Madrid

Muszyński K, Pulignano V, Domecka M, Mrozowicki A (2021) Coping with precarity during COVID-19: A study of platform work in Poland. Int Labour Rev 161(3):463–485. https://doi.org/10.1111/ilr.12224

Murati E (2021) What are digital platforms? An overview of definitions, typologies, economics, and legal challenges arising from the platform economy in EU. Eur J Priv Law Technol 2021(1):19–55. https://universitypress.unisob.na.it/ojs/index.php/ejplt/article/view/1264/662

Neber H, Anton M (2008) Promoting pre-experimental activities in high-school chemistry: focusing on the role of students’ epistemic questions. Int J Sci Educ 30(13):1801–1821

Nelson T (2018) Unions in digital labour studies: a review of information society and Marxist autonomist approaches. TripleC-Commun Capit 16(2). https://doi.org/10.31269/triplec.v16i2.1065

Page MJ, McKenzie J, Bossuyt PM et al. (2021) The PRISMA 2020 statement: an updated guideline for reporting systematic reviews. Syst Rev 10(89):2–11. https://doi.org/10.1186/s13643-021-01626-4

Patino A, Naffi N (2023) Lifelong training approaches for the post-pandemic workforces: a systematic review. Int J Lifelong Educ 42(3):249–269. https://doi.org/10.1080/02601370.2023.2214333

Patriotta G (2020) Writing impactful review articles. J Manag Stud 57(6):1272–1276. https://doi.org/10.1111/joms.12608

Post C, Sarala R, Gatrell C, Prescott E (2020) Advancing theory with review articles. J Manag Stud 57(2):351–376. https://doi.org/10.1111/joms.12549

Reuver M, Sørensen C, Basole (2018) The digital platform: a research agenda. J Inf Technol -UK 33(2):124–135. https://doi.org/10.1057/s41265-016-0033-3

Ruiz-Palomino P, Linuesa-Langreo J, Kelly L (2019) Hacia nuevos modelos empresariales más sociales y humanos: El papel de las mujeres en procesos de emprendimiento social y economía de comunión. Empresa y Humanismo 22(2):87–122. https://doi.org/10.15581/015.XXII.2.87-122

Selimović J, Pilav-Velić A, Krndžija L (2021) Digital workplace transformation in the financial service sector: investigating the relationship between employees’ expectations and intentions. Technol Soc 66:101640. https://doi.org/10.1016/j.techsoc.2021.101640

Soriano C, Cabanes JV (2020) Entrepreneurial solidarities: social media collectives and Filipino digital platform workers. Soc Media Soc 6(2):1–11. https://doi.org/10.1177/2056305120926484

Stahlschmidt S, Stephen D (2020) Comparison of Web of Science, Scopus and dimensions databases. KB Forschungspoolprojekt 2020. Available at: https://bibliometrie.info/downloads/DZHW-Comparison-DIM-SCP-WOS.PDF

Stieglitz S, Brachten F, Kissmer T (2018) Defining bots in an enterprise context. International Conference on Interaction Sciences. CIS 2018 Proceedings. 5. https://aisel.aisnet.org/icis2018/impact/Presentations/5

Taylor M, Marsh G, Nicole D, Broadbent P (2017) Good work: the Taylor review of modern working practices. Available via https://www.gov.uk/government/publications/good-work-the-taylor-review-of-modern-working-practices Accessed 03 June 2024

Theres C, Strohmeier S (2023) Consolidating the theoretical foundations of digital human resource management acceptance and use research: a meta-analytic validation of UTAUT. Manag Rev Q https://doi.org/10.1007/s11301-023-00367-z

Villajos E, Tordera N, Peiró JM, van Veldhoven M (2019) Refinement and validation of a comprehensive scale for measuring HR practices aimed at performance-enhancement and employee-support. Eur Manag J 37(3):387–397. https://doi.org/10.1016/j.emj.2018.10.003

White M (2012) Digital workplaces: vision and reality. Bus Inf Rev 29(4):205–214. https://doi.org/10.1177/0266382112470412

Download references

Acknowledgements

This paper has been supported by Project PID2021-124641NB-I00 of the Ministry of Science and Innovation (Spain) and by research group in Open Innovation, Universidad Rey Juan Carlos (Spain). Open Access funding enabled and organized by Project V1313 “Sustainability Support”, signed under Article 60 of the LOSU between the Universidad Rey Juan Carlos (Spain) and the company Triple Sustainability SLU to carry out scientific-technical work and training activities.

Author information

Authors and affiliations.

Universidad Rey Juan Carlos, Madrid, Spain

Laura García-Fernández, Marta Ortiz-de-Urbina-Criado & María-José García-López

You can also search for this author in PubMed   Google Scholar

Contributions

Authors contributed equally to this work, and they jointly supervised this work. Contributors to the concept or design of the article: LGF, MOUC, MJGL. Contributed to analysis and interpretation of data: LGF, MOUC, MJGL. Drafting work or critically revising it for important intellectual content: LGF, MOUC, MJGL. Final approval of the version: LGF, MOUC, MJGL. Agreement to be responsible for all aspects of work: LGF, MOUC, MJGL.

Corresponding author

Correspondence to Laura García-Fernández .

Ethics declarations

Competing interests.

The authors declare no competing interests.

Ethical approval

Ethical approval was not required as the study did not involve human participants.

Informed consent

This article does not contain any studies with human participants performed by any of the authors.

Additional information

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Open Access This article is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License, which permits any non-commercial use, sharing, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if you modified the licensed material. You do not have permission under this licence to share adapted material derived from this article or parts of it. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by-nc-nd/4.0/ .

Reprints and permissions

About this article

Cite this article.

García-Fernández, L., Ortiz-de-Urbina-Criado, M. & García-López, MJ. Mapping the main research themes in digital human resources. Humanit Soc Sci Commun 11 , 1267 (2024). https://doi.org/10.1057/s41599-024-03795-8

Download citation

Received : 29 May 2023

Accepted : 16 September 2024

Published : 27 September 2024

DOI : https://doi.org/10.1057/s41599-024-03795-8

Share this article

Anyone you share the following link with will be able to read this content:

Sorry, a shareable link is not currently available for this article.

Provided by the Springer Nature SharedIt content-sharing initiative

Quick links

  • Explore articles by subject
  • Guide to authors
  • Editorial policies

research topics in data communication and networking

Communications and Networking Laboratory

The Communications and Networking (Commnet) Laboratory in the Department of Electrical and Computer Engineering at Northwestern University is the home to faculty, postdocs, and students interested in communications and networking.

Our research draws on a wide range of techniques including information theory, communication theory, networking, signal processing, optimization methods, and stochastic control to advance our understanding of the theoretical limits of communication systems and networks, as well as to design and implement novel algorithms for approaching these limits.

Specific research topics include:

  • Blockchain and decentralization
  • Distributed learning over networks
  • Interference Mitigation and Management for Spectrum Coexistence
  • Integrated Sensing and Communications using Millimeter-Wave Systems
  • Learning and control for advanced wireless networks
  • MAC layer protocols for cellular vehicular networking (C-V2X)
  • Network control algorithms for mission-critical / time-sensitive applications
  • Network economic modeling of spectrum sharing for Next Generation (6G+) wireless networks

Recent News

research topics in data communication and networking

Best Paper Award: Policy Track

Best poster presentation.

http://Best%20Poster%20Presentation

1st place ACM SIGCOMM SRC

Prof. Igor Kadota and collaborators from Columbia University earned first place in the ACM SIGCOMM Student Research Competition for their demo “ Experimentation with Wideband Real-Time Adaptive Full-Duplex Radios ,” which is joint work with Alon Simon Levin , Sasank Garikapati , Bo Zhang , Aditya Jolly , Manav Kohli , Prof. Mingoo Seok , Prof. Harish Krishnaswamy and Prof. Gil Zussman .

Please find additional information in this news item .

Bitcoin Research Prize

Prof. Dongning Guo and Prof. Ling Ren (UIUC) earned the 2023 Bitcoin Research Prize at the Chaincode Labs Bitcoin Research Day event for their paper entitled “ Bitcoin’s Latency—Security Analysis Made Simple .”

http://Bitcoin%20Research%20Prize

Best Student Paper Award

Workshop at ifip performance.

Invited speakers: Steven H. Low (Caltech), Urbashi Mitra (USC), Guannan Qu (CMU), Alejandro Ribeiro (UPenn), Sanjay Shakkottai (UT Austin), and Vijay G. Subramanian (UMich).

http://Workshop%20at%20IFIP%20Performance

Grant from NSF SII-NRDZ-SBE

http://Grant%20from%20NSF%20SII-NRDZ-SBE

A Brief Study on Data Communication and Computer Networks

7 Pages Posted: 4 Sep 2021

Saideep Sunkari

Kakatiya Institute of Technology and Science, Warangal

Date Written: August 13, 2021

A computer network, sometimes known as a data network, is a kind of telecommunications network that enables computers to communicate with one another. Data is passed between networked computing devices through data links in computer networks. Cable or wireless media are used to establish connections (network links) between nodes. The Internet is the most well-known computer network. Network nodes are computer devices that originate, transport, and terminate data on a network. Hosts such as personal computers, phones, servers, and networking gear are examples of nodes. When one device can share information with another device, whether or not they have a direct connection, they are said to be networked together. Access to the World Wide Web, shared usage of application and storage servers, printers, and fax machines, and the use of email and instant messaging apps are all supported via computer networks. The physical medium used to carry signals, the communications protocols used to arrange network traffic, the network's scale, topology, and organizational intent all vary across computer networks.

Keywords: Computer Networks, Network Classifications, Local Area Network, Coaxial Cables, Network Security, Physical Layer

Suggested Citation: Suggested Citation

Saideep Sunkari (Contact Author)

Kakatiya institute of technology and science, warangal ( email ).

Yerragattu Hillock Hasanparthy Warangal, IN 506015 India

Do you have a job opening that you would like to promote on SSRN?

Paper statistics, related ejournals, information systems ejournal.

Subscribe to this fee journal for more curated articles on this topic

Communication & Technology eJournal

  • Privacy Policy

Research Method

Home » 300+ Communication Research Topics

300+ Communication Research Topics

Communication Research Topics

Communication is an essential aspect of our everyday lives. It is the backbone of human interaction and the foundation of relationships, both personal and professional. As technology continues to advance, the ways in which we communicate are constantly evolving, and with it, new research topics emerge. Communication research spans a wide range of disciplines, including psychology , sociology , linguistics, and anthropology , among others. In this blog post, we will explore some of the most fascinating and relevant communication research topics that are shaping our understanding of human interaction in the modern age.

Communication Research Topics

Communication Research Topics are as follows:

  • The effectiveness of nonverbal communication in virtual interactions
  • Cross-cultural communication in multinational corporations
  • The role of social media in shaping public opinion
  • The impact of technology on interpersonal communication skills
  • The influence of language barriers on intercultural communication
  • Gender differences in communication styles
  • The effect of communication on workplace culture
  • The role of communication in conflict resolution
  • The impact of communication technology on long-distance relationships
  • Communication strategies for virtual teams
  • The effects of communication on employee motivation
  • The role of communication in leadership
  • The impact of communication on consumer behavior
  • The role of communication in healthcare
  • The effects of communication on public relations
  • The impact of communication on customer satisfaction
  • The role of communication in organizational change
  • The effect of communication on employee turnover
  • The impact of communication on job satisfaction
  • The role of communication in team building
  • The effects of communication on organizational performance
  • The impact of communication on decision-making processes
  • The role of communication in crisis management
  • The effect of communication on organizational culture
  • The impact of communication on sales performance
  • The role of communication in cross-functional teams
  • The effects of communication on knowledge sharing
  • The impact of communication on customer loyalty
  • The role of communication in innovation
  • The effect of communication on supply chain management
  • The impact of communication on project management
  • The role of communication in talent management
  • The effects of communication on employee engagement
  • The impact of communication on stakeholder engagement
  • The role of communication in organizational learning
  • The effect of communication on team performance
  • The impact of communication on organizational trust
  • The role of communication in change management
  • The effects of communication on organizational agility
  • The impact of communication on organizational creativity
  • The role of communication in knowledge management
  • The effect of communication on brand reputation
  • The impact of communication on employee well-being
  • The role of communication in corporate social responsibility
  • The effects of communication on customer experience
  • The impact of communication on organizational ethics
  • The role of communication in performance management
  • The effect of communication on talent retention
  • The impact of communication on organizational identity
  • The role of communication in customer retention.
  • The role of communication in sustainable development
  • The effects of communication on political campaigns
  • The impact of communication on public policy-making
  • The role of communication in disaster management
  • The effects of communication on environmental activism
  • The impact of communication on public health campaigns
  • The role of communication in social movements
  • The effects of communication on intergroup relations
  • The impact of communication on cultural identity
  • The role of communication in multicultural societies
  • The effects of communication on media literacy
  • The impact of communication on civic engagement
  • The role of communication in social capital formation
  • The effects of communication on online communities
  • The impact of communication on democracy
  • The role of communication in public opinion formation
  • The effects of communication on conspiracy theories
  • The impact of communication on media bias
  • The role of communication in international relations
  • The effects of communication on peacebuilding
  • The impact of communication on diplomacy
  • The role of communication in conflict transformation
  • The effects of communication on human rights advocacy
  • The impact of communication on transitional justice
  • The role of communication in gender equality
  • The effects of communication on sexual health education
  • The impact of communication on youth empowerment
  • The role of communication in rural development
  • The effects of communication on poverty reduction
  • The impact of communication on economic growth
  • The role of communication in cultural diplomacy
  • The effects of communication on virtual reality
  • The impact of communication on artificial intelligence
  • The role of communication in e-commerce
  • The effects of communication on online privacy
  • The impact of communication on cybersecurity
  • The role of communication in online education
  • The effects of communication on online activism
  • The impact of communication on social media addiction
  • The role of communication in mental health awareness
  • The effects of communication on healthcare disparities
  • The impact of communication on health policy
  • The role of communication in crisis communication
  • The effects of communication on risk perception
  • The impact of communication on disaster preparedness
  • The role of communication in community development
  • The effects of communication on community resilience
  • The impact of communication on community participation
  • The role of communication in public safety
  • The effects of communication on public transportation planning.
  • The role of communication in mental health treatment and recovery
  • The role of communication in digital transformation
  • The role of communication in artificial intelligence ethics
  • The role of communication in promoting mental health
  • The role of communication in building trust in virtual teams
  • The role of communication in corporate crisis management
  • The effects of communication on intercultural marriage satisfaction
  • The impact of communication on peacekeeping missions
  • The role of communication in human resource management
  • The effects of communication on emotional labor in the workplace
  • The impact of communication on healthcare provider-patient relationships
  • The role of communication in social entrepreneurship
  • The effects of communication on virtual trust building
  • The impact of communication on environmental education
  • The role of communication in cultural preservation
  • The effects of communication on online learning engagement
  • The impact of communication on social media platform regulations
  • The role of communication in organizational change management
  • The effects of communication on virtual reality gaming experiences
  • The impact of communication on urban resilience
  • The role of communication in feminist movements
  • The effects of communication on disaster response coordination
  • The impact of communication on social support networks
  • The role of communication in intergenerational caregiving
  • The effects of communication on online privacy policies comprehension
  • The impact of communication on indigenous language revitalization
  • The role of communication in intercultural conflict resolution
  • The effects of communication on political polarization in social media
  • The impact of communication on digital literacy
  • The role of communication in online community management
  • The effects of communication on virtual team communication satisfaction
  • The impact of communication on sustainable transportation practices
  • The role of communication in multicultural counseling
  • The effects of communication on e-commerce return policies
  • The impact of communication on sustainable agriculture practices
  • The role of communication in social media influencer marketing
  • The effects of communication on intercultural collaboration in the workplace
  • The impact of communication on online safety education
  • The role of communication in social enterprise management
  • The effects of communication on virtual team conflict management
  • The impact of communication on public perception of scientific research
  • The role of communication in public-private partnerships
  • The effects of communication on ethical decision-making in the workplace
  • The impact of communication on online civic engagement
  • The role of communication in sustainable tourism development
  • The effects of communication on online engagement in political campaigns
  • The impact of communication on cross-cultural adaptation
  • The role of communication in virtual reality tourism
  • The effects of communication on online privacy protection behaviors
  • The impact of communication on sustainable waste management practices
  • The role of communication in sustainable urban development
  • The effects of communication on intercultural sensitivity in healthcare
  • The impact of communication on environmental activism mobilization
  • The role of communication in conflict-sensitive journalism
  • The effects of communication on virtual team decision-making.
  • The effects of communication on online consumer behavior
  • The impact of communication on community resilience in disaster recovery
  • The role of communication in climate change communication campaigns
  • The effects of communication on intergenerational communication in the workplace
  • The impact of communication on patient satisfaction in virtual healthcare delivery
  • The effects of communication on political participation of marginalized groups
  • The impact of communication on workplace communication satisfaction
  • The role of communication in virtual event marketing
  • The effects of communication on online privacy perceptions
  • The impact of communication on workplace stress and burnout
  • The role of communication in promoting social responsibility in the workplace
  • The effects of communication on consumer perceptions of brand personality
  • The impact of communication on healthcare provider-patient communication
  • The role of communication in promoting ethical behavior in the workplace
  • The effects of communication on online self-disclosure
  • The impact of communication on intercultural business negotiations
  • The role of communication in promoting cultural diversity in the workplace
  • The effects of communication on intergenerational family communication
  • The impact of communication on online privacy protection behavior
  • The role of communication in promoting social justice in the workplace
  • The effects of communication on social media influencer marketing
  • The impact of communication on intercultural adaptation
  • The role of communication in promoting sustainable consumption behavior
  • The effects of communication on online information seeking behavior
  • The impact of communication on consumer trust in online reviews
  • The role of communication in promoting interfaith dialogue and understanding
  • The effects of communication on intercultural friendship formation
  • The impact of communication on workplace conflict resolution
  • The role of communication in promoting cross-cultural communication in international business
  • The effects of communication on online trust in e-commerce
  • The impact of communication on intercultural empathy development
  • The role of communication in promoting environmental sustainability behavior
  • The effects of communication on intercultural communication competence in healthcare
  • The impact of communication on employee engagement in the workplace
  • The role of communication in promoting cross-generational communication in families
  • The effects of communication on social media addiction among adolescents
  • The impact of communication on cross-cultural virtual teamwork
  • The role of communication in promoting ethical consumption behavior
  • The effects of communication on online privacy concerns
  • The impact of communication on intercultural negotiation in international business
  • The role of communication in promoting cultural humility in healthcare
  • The effects of communication on social media influencer authenticity perception
  • The impact of communication on intercultural trust development
  • The role of communication in promoting sustainable tourism behavior
  • The effects of communication on online privacy awareness and education
  • The impact of communication on cross-generational conflict resolution in families
  • The role of communication in promoting intercultural dialogue and understanding
  • The effects of communication on cross-cultural communication competence in education.
  • The effects of communication on workplace productivity
  • The role of communication in interfaith dialogue
  • The effects of communication on online privacy and security
  • The impact of communication on virtual reality gaming
  • The role of communication in online sports fandom
  • The effects of communication on digital advertising effectiveness
  • The impact of communication on virtual reality marketing
  • The role of communication in community resilience to natural disasters
  • The effects of communication on citizen journalism
  • The impact of communication on social media influencer marketing
  • The effects of communication on intercultural communication competence
  • The impact of communication on virtual reality training
  • The role of communication in promoting physical health
  • The effects of communication on social media use and addiction
  • The impact of communication on social media engagement
  • The role of communication in promoting sustainable fashion
  • The impact of communication on virtual reality tourism
  • The role of communication in promoting intercultural understanding
  • The effects of communication on media framing and bias
  • The impact of communication on social media analytics and metrics
  • The role of communication in promoting gender equality in the workplace
  • The effects of communication on online censorship and freedom of speech
  • The impact of communication on virtual reality art and design
  • The role of communication in promoting intergenerational understanding
  • The effects of communication on media ownership and control
  • The impact of communication on virtual reality education
  • The role of communication in promoting sustainable transportation
  • The effects of communication on virtual reality entertainment
  • The impact of communication on virtual reality shopping
  • The role of communication in promoting sustainable agriculture
  • The effects of communication on virtual reality real estate
  • The impact of communication on virtual reality healthcare
  • The role of communication in promoting sustainable urban development
  • The effects of communication on virtual reality architecture and engineering
  • The impact of communication on virtual reality sports training
  • The role of communication in promoting sustainable food systems
  • The effects of communication on online political polarization
  • The impact of communication on virtual reality socialization
  • The role of communication in promoting sustainable tourism
  • The effects of communication on virtual reality fashion and beauty
  • The impact of communication on virtual reality mental health therapy
  • The role of communication in promoting sustainable energy consumption
  • The effects of communication on virtual reality music and entertainment
  • The impact of communication on virtual reality healthcare training
  • The role of communication in promoting sustainable waste management
  • The effects of communication on virtual reality journalism and news reporting.
  • The effects of communication on social influence
  • The impact of communication on public trust
  • The role of communication in virtual reality therapy
  • The effects of communication on intercultural empathy
  • The impact of communication on workplace diversity and inclusion
  • The role of communication in online reputation management
  • The effects of communication on e-commerce customer reviews
  • The impact of communication on virtual team performance
  • The role of communication in international business negotiations
  • The effects of communication on social justice movements
  • The impact of communication on corporate social responsibility practices
  • The role of communication in virtual leadership
  • The effects of communication on social media activism
  • The impact of communication on online hate speech
  • The role of communication in conflict prevention
  • The effects of communication on global citizenship
  • The impact of communication on gender-based violence prevention
  • The role of communication in disaster risk reduction
  • The effects of communication on online misinformation
  • The impact of communication on mental health stigma reduction
  • The role of communication in virtual healthcare delivery
  • The effects of communication on brand loyalty
  • The impact of communication on consumer trust
  • The role of communication in political polarization
  • The effects of communication on civic education
  • The impact of communication on intercultural competence development
  • The role of communication in environmental conservation
  • The effects of communication on sustainable tourism practices
  • The impact of communication on urban planning
  • The role of communication in disaster recovery
  • The effects of communication on digital privacy advocacy
  • The impact of communication on public health policy-making
  • The role of communication in global governance
  • The effects of communication on intergenerational communication
  • The impact of communication on organizational innovation
  • The role of communication in virtual event planning
  • The effects of communication on virtual networking
  • The impact of communication on language revitalization efforts
  • The role of communication in community policing
  • The effects of communication on virtual team building
  • The impact of communication on online education effectiveness
  • The role of communication in food security efforts
  • The effects of communication on intercultural education
  • The impact of communication on media ownership and control
  • The role of communication in entrepreneurship
  • The effects of communication on the digital divide
  • The impact of communication on sustainable energy practices
  • The role of communication in political campaigns for women candidates
  • The effects of communication on diversity and inclusion in media representation.
  • The effects of communication on innovation adoption
  • The impact of communication on remote work
  • The role of communication in online customer service
  • The effects of communication on online brand communities
  • The impact of communication on online brand reputation
  • The role of communication in online political campaigning
  • The effects of communication on political polarization
  • The role of communication in social media marketing
  • The impact of communication on online product reviews
  • The role of communication in online trust building
  • The impact of communication on online data security
  • The role of communication in online content moderation
  • The effects of communication on online information overload
  • The impact of communication on online news consumption
  • The effects of communication on online student engagement
  • The impact of communication on online learning outcomes
  • The role of communication in online teamwork
  • The effects of communication on online collaboration
  • The impact of communication on online project success
  • The role of communication in online conflict resolution
  • The effects of communication on online negotiation outcomes
  • The impact of communication on online group decision-making
  • The role of communication in online leadership
  • The effects of communication on online employee performance
  • The impact of communication on online team trust
  • The role of communication in online customer support
  • The effects of communication on online customer satisfaction
  • The impact of communication on online sales conversion
  • The role of communication in online brand loyalty
  • The effects of communication on online reputation management
  • The impact of communication on online influencer marketing
  • The role of communication in online crisis management
  • The effects of communication on online brand recovery
  • The impact of communication on online customer loyalty
  • The role of communication in online customer retention
  • The effects of communication on online service quality
  • The impact of communication on online customer experience
  • The role of communication in online brand equity
  • The effects of communication on online brand identity
  • The impact of communication on online brand differentiation
  • The role of communication in online brand awareness
  • The effects of communication on online customer engagement
  • The impact of communication on online word-of-mouth
  • The role of communication in online social influence
  • The effects of communication on online user-generated content.
  • The effects of communication on cultural assimilation and integration
  • The impact of communication on digital marketing
  • The role of communication in ethical decision-making
  • The effects of communication on intergenerational relationships
  • The role of communication in global supply chains
  • The effects of communication on cultural tourism
  • The impact of communication on political polarization
  • The role of communication in language acquisition
  • The effects of communication on healthcare decision-making
  • The impact of communication on public transportation ridership
  • The role of communication in crisis management for tourism destinations
  • The effects of communication on international trade relations
  • The impact of communication on green consumerism
  • The role of communication in organizational transparency and accountability
  • The effects of communication on public perception of science and technology
  • The impact of communication on financial literacy and decision-making
  • The effects of communication on intergenerational wealth transfer
  • The impact of communication on food culture and consumption
  • The role of communication in emergency preparedness and response
  • The effects of communication on alternative energy adoption
  • The impact of communication on entrepreneurship and innovation
  • The role of communication in international development
  • The effects of communication on the gig economy
  • The impact of communication on consumer behavior in the sharing economy
  • The role of communication in sports marketing
  • The impact of communication on media convergence
  • The role of communication in art and cultural preservation
  • The effects of communication on social entrepreneurship
  • The impact of communication on global health disparities
  • The role of communication in international humanitarian aid
  • The effects of communication on refugee integration and resettlement
  • The impact of communication on sustainable urban planning
  • The role of communication in environmental conservation and activism
  • The effects of communication on global security and terrorism
  • The impact of communication on climate change policy and action
  • The role of communication in animal welfare advocacy
  • The effects of communication on the politics of immigration
  • The role of communication in international diplomacy and negotiation
  • The effects of communication on the psychology of decision-making
  • The impact of communication on organizational knowledge management
  • The role of communication in disaster recovery and resilience
  • The effects of communication on healthcare technology adoption
  • The impact of communication on cybersecurity policy and regulation
  • The role of communication in sustainable fashion and textiles
  • The effects of communication on human trafficking prevention and intervention.
  • The role of communication in international disaster relief
  • The effects of communication on social media addiction
  • The impact of communication on virtual mentoring
  • The role of communication in sustainable fashion industry practices
  • The effects of communication on intercultural communication apprehension
  • The impact of communication on political polarization in traditional media
  • The effects of communication on social media mental health awareness campaigns
  • The impact of communication on sustainable water management practices
  • The role of communication in multicultural education
  • The effects of communication on virtual team creativity
  • The impact of communication on global health campaigns
  • The role of communication in ethical marketing practices
  • The effects of communication on virtual collaboration satisfaction
  • The impact of communication on sustainable forestry practices
  • The role of communication in immigrant integration
  • The effects of communication on virtual team feedback and evaluation
  • The impact of communication on environmental activism strategies
  • The effects of communication on virtual team leadership
  • The impact of communication on sustainable seafood industry practices
  • The role of communication in conflict resolution in online communities
  • The effects of communication on virtual team trust and cohesion
  • The impact of communication on urban mobility practices
  • The role of communication in cultural heritage preservation
  • The effects of communication on virtual team decision-making processes
  • The impact of communication on sustainable mining practices
  • The role of communication in peacebuilding and reconciliation
  • The effects of communication on virtual team conflict resolution
  • The impact of communication on sustainable renewable energy practices
  • The role of communication in virtual reality education
  • The effects of communication on virtual team member satisfaction
  • The impact of communication on sustainable packaging practices
  • The role of communication in intercultural adaptation
  • The effects of communication on virtual team project management
  • The impact of communication on environmental consumerism
  • The role of communication in cross-cultural negotiation
  • The effects of communication on virtual team member motivation
  • The impact of communication on sustainable tourism marketing strategies
  • The role of communication in social entrepreneurship ecosystems
  • The effects of communication on virtual team member commitment
  • The impact of communication on sustainable food supply chain practices
  • The role of communication in global health diplomacy
  • The effects of communication on virtual team member diversity
  • The impact of communication on sustainable mining industry practices
  • The role of communication in refugee integration
  • The effects of communication on virtual team information sharing
  • The impact of communication on sustainable transportation infrastructure
  • The role of communication in sustainable seafood industry marketing
  • The effects of communication on virtual team conflict prevention.
  • The role of communication in promoting interfaith dialogue
  • The effects of communication on online hate speech countermeasures
  • The impact of communication on sustainable fashion practices
  • The role of communication in peacebuilding
  • The effects of communication on intercultural adaptation in study abroad programs
  • The impact of communication on intergenerational relationships
  • The role of communication in virtual mentorship
  • The effects of communication on ethical consumption behaviors
  • The impact of communication on environmental activism communication strategies
  • The role of communication in disaster preparedness
  • The effects of communication on mental health literacy
  • The role of communication in building resilience in marginalized communities
  • The impact of communication on online identity formation
  • The role of communication in sustainability reporting
  • The effects of communication on cross-cultural communication apprehension
  • The impact of communication on intercultural marketing effectiveness
  • The effects of communication on virtual learning outcomes
  • The impact of communication on corporate social responsibility reporting
  • The role of communication in building trust in online dating
  • The effects of communication on online activism mobilization
  • The role of communication in international conflict resolution
  • The effects of communication on online consumer reviews
  • The impact of communication on multicultural team performance
  • The role of communication in sustainable urban mobility
  • The effects of communication on intercultural adaptation in international business
  • The impact of communication on virtual reality education effectiveness
  • The role of communication in social entrepreneurship funding
  • The effects of communication on online engagement in civic education
  • The impact of communication on sustainable tourism marketing
  • The role of communication in building resilience in disaster-affected communities
  • The effects of communication on virtual team trust
  • The impact of communication on online mental health interventions
  • The role of communication in multicultural team conflict resolution
  • The effects of communication on virtual team creativity in crisis situations
  • The impact of communication on sustainable waste reduction practices
  • The role of communication in intercultural negotiation
  • The effects of communication on online privacy invasion perceptions
  • The impact of communication on sustainable energy consumption behaviors
  • The role of communication in building social capital in marginalized communities
  • The effects of communication on virtual team communication effectiveness
  • The impact of communication on sustainable forest management practices
  • The role of communication in promoting diversity in the workplace
  • The effects of communication on virtual team psychological safety
  • The impact of communication on multicultural team decision-making
  • The role of communication in promoting sustainable tourism practices in developing countries
  • The effects of communication on online civic participation.
  • The role of communication in organizational culture
  • The effects of communication on intercultural negotiation outcomes
  • The impact of communication on mental health treatment adherence
  • The role of communication in sustainable fashion practices
  • The effects of communication on online customer service satisfaction
  • The impact of communication on interfaith dialogue
  • The role of communication in virtual customer experience management
  • The effects of communication on gender representation in media
  • The impact of communication on human rights advocacy
  • The role of communication in urban planning for climate change adaptation
  • The effects of communication on virtual team performance in crisis situations
  • The role of communication in ethical decision-making in healthcare
  • The effects of communication on online brand authenticity perception
  • The impact of communication on social support for caregivers
  • The role of communication in sustainable tourism marketing
  • The impact of communication on virtual reality therapy for phobias
  • The role of communication in virtual team trust repair
  • The effects of communication on intergenerational workplace conflict resolution
  • The role of communication in online reputation repair
  • The effects of communication on gender-based violence reporting
  • The impact of communication on rural healthcare access
  • The role of communication in sustainable supply chain management
  • The effects of communication on intercultural learning in study abroad programs
  • The impact of communication on virtual reality tourism experiences
  • The role of communication in sustainable energy marketing
  • The impact of communication on interfaith conflict resolution
  • The role of communication in environmental justice movements
  • The role of communication in intercultural team leadership
  • The effects of communication on online brand trustworthiness
  • The impact of communication on social media activism mobilization
  • The role of communication in virtual customer relationship management
  • The effects of communication on intergenerational mentorship
  • The impact of communication on sustainable transportation marketing
  • The role of communication in sustainable urban design
  • The effects of communication on virtual team knowledge sharing
  • The impact of communication on social media user privacy perceptions
  • The role of communication in conflict resolution in healthcare
  • The effects of communication on intercultural communication competence in business
  • The impact of communication on sustainable food practices
  • The role of communication in sustainable tourism planning
  • The effects of communication on virtual team motivation
  • The impact of communication on interfaith dialogue and reconciliation
  • The role of communication in online brand advocacy
  • The effects of communication on gender representation in leadership.

About the author

' src=

Muhammad Hassan

Researcher, Academic Writer, Web developer

You may also like

Psychology Research Paper Topics

500+ Psychology Research Paper Topics

Statistics Research Topics

500+ Statistics Research Topics

Climate Change Research Topics

500+ Climate Change Research Topics

Astronomy Research Topics

500+ Astronomy Research Topics

AP Research Topic Ideas

300+ AP Research Topic Ideas

Qualitative_Research_Topics

500+ Qualitative Research Titles and Topics

Numbers, Facts and Trends Shaping Your World

Read our research on:

Full Topic List

Regions & Countries

Publications

  • Our Methods
  • Short Reads
  • Tools & Resources

Read Our Research On:

Internet & Technology

Why many parents and teens think it’s harder being a teen today.

Is it harder being a teen today? Or do they have it easier than those of past generations? We asked parents and teens who say being a teenager has gotten harder or easier to explain in their own words why they think so.

Many Israelis say social media content about the Israel-Hamas war should be censored

About half of tiktok users under 30 say they use it to keep up with politics, news, 72% of u.s. high school teachers say cellphone distraction is a major problem in the classroom, sign up for our internet, science, and tech newsletter.

New findings, delivered monthly

Americans in both parties are concerned over the impact of AI on the 2024 presidential campaign

Americans also express little confidence in major technology companies to prevent misuse of their platforms to influence the election.

More Americans – especially young adults – are regularly getting news on TikTok

The share of adults who say they regularly get news from TikTok has grown about fivefold since 2020, from 3% to 17% in 2024.

News Platform Fact Sheet

How Americans get news has greatly changed in the 21st century. Most now use digital devices for news at least sometimes. Read about the platforms they turn to.

How U.S. Public Opinion Has Changed in 20 Years of Our Surveys

We took a closer look at how Americans’ views and experiences have evolved on a variety of topics over the last 20 years.

Support for a U.S. TikTok ban continues to decline, and half of adults doubt it will happen

The share of Americans who support the U.S. government banning TikTok now stands at 32%, down from 38% in fall 2023 and 50% in March 2023.

Most Israeli adults do not post or share about political and social issues online – including the war between Israel and Hamas.

TikTok users under 30 see its impact on democracy more positively than older users, with 45% of this group saying it’s mostly good for American democracy.

Some 72% of high school teachers say that students being distracted by cellphones is a major problem in their classroom.

How Americans Navigate Politics on TikTok, X, Facebook and Instagram

X stands out as a place people go to keep up with politics. Still, some users see political posts on Facebook, TikTok and Instagram, too.

REFINE YOUR SELECTION

Research teams, signature reports.

research topics in data communication and networking

The State of Online Harassment

Roughly four-in-ten Americans have experienced online harassment, with half of this group citing politics as the reason they think they were targeted. Growing shares face more severe online abuse such as sexual harassment or stalking

Parenting Children in the Age of Screens

Two-thirds of parents in the U.S. say parenting is harder today than it was 20 years ago, with many citing technologies – like social media or smartphones – as a reason.

Dating and Relationships in the Digital Age

From distractions to jealousy, how Americans navigate cellphones and social media in their romantic relationships.

Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information

Majorities of U.S. adults believe their personal data is less secure now, that data collection poses more risks than benefits, and that it is not possible to go through daily life without being tracked.

Americans and ‘Cancel Culture’: Where Some See Calls for Accountability, Others See Censorship, Punishment

Social media fact sheet, digital knowledge quiz, video: how do americans define online harassment.

901 E St. NW, Suite 300 Washington, DC 20004 USA (+1) 202-419-4300 | Main (+1) 202-857-8562 | Fax (+1) 202-419-4372 |  Media Inquiries

Research Topics

  • Email Newsletters

ABOUT PEW RESEARCH CENTER  Pew Research Center is a nonpartisan, nonadvocacy fact tank that informs the public about the issues, attitudes and trends shaping the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, computational social science research and other data-driven research. Pew Research Center is a subsidiary of The Pew Charitable Trusts , its primary funder.

© 2024 Pew Research Center

50+ Data Communication And Networking Micro Project Topics [Revised]

Data Communication And Networking Micro Project Topics

  • Post author By admin
  • March 28, 2024

In today’s world where everything is connected, sharing information between different devices and systems is super important, and that’s where data communication and networking come into play. Whether it’s sending an email, browsing the web, or streaming videos, we rely on networks to stay connected. For beginners looking to delve into the world of data communication and networking micro project topics, that offer a hands-on approach to learning and experimentation.

In this blog, we’ll explore some exciting micro project ideas suitable for beginners in simple language.

Table of Contents

Understanding Data Communication and Networking

  • Data communication involves the transmission and reception of data between two or more devices.
  • Networking refers to the interconnection of multiple devices to share resources and information.
  • These concepts form the foundation of modern communication systems, enabling seamless connectivity.

What Are The 5 Most Common Types Of Computer Networking?

The five most common types of computer networking are:

  • Local Area Network (LAN)
  • LANs connect devices within a limited geographical area, such as a home, office, or school.
  • Example: An office LAN where computers, printers, and servers are interconnected for sharing resources and data.
  • Wide Area Network (WAN)
  • Wireless Local Area Networks (WLANs) work by using wireless technology like Wi-Fi to link devices together in a small space without using cables.
  • For instance , imagine a coffee shop that provides Wi-Fi access to its customers, enabling them to go online with their laptops or smartphones without needing to plug in any wires.
  • Wireless Local Area Network (WLAN)
  • WLANs use wireless technology, such as Wi-Fi, to connect devices within a limited area without the need for physical cables.
  • Example: A coffee shop offering Wi-Fi connectivity to customers, allowing them to access the internet from their laptops or smartphones.
  • Metropolitan Area Network (MAN)
  • MANs cover a larger geographical area than LANs but smaller than WANs, typically serving a city or metropolitan region.
  • Example: A city-wide network connecting various government offices, educational institutions, and businesses to facilitate communication and resource sharing.
  • Personal Area Network (PAN)
  • PANs are used for connecting devices within the immediate vicinity of an individual, typically within a range of a few meters.
  • Example: Bluetooth-enabled devices like smartphones, laptops, and wearable gadgets forming a PAN for sharing files, connecting peripherals, or streaming audio.

50+ Data Communication And Networking Micro Project Topics: Category Wise

Network protocols and standards.

  • Implementation of IPv6 in a Small Network Environment
  • Analysis of Different Transport Layer Protocols (TCP vs. UDP)
  • Development of a Custom Application Layer Protocol
  • Evaluation of HTTP/2 Performance Compared to HTTP/1.1
  • Implementation of DNSSEC for Secure Domain Name Resolution

Network Security

  • Design and Implementation of a VPN Using OpenVPN
  • Analysis of SSL/TLS Handshake Process and Vulnerabilities
  • Development of a Network Intrusion Detection System (NIDS)
  • Implementation of Two-Factor Authentication for Network Access
  • Design and Deployment of a Honeypot for Intrusion Detection

Wireless Communication

  • Performance Evaluation of 5G Wireless Technology
  • Design and Deployment of a Mesh Network Using Zigbee
  • Analysis of Signal Strength Variation in Wi-Fi Networks
  • Implementation of Bluetooth Low Energy (BLE) for IoT Applications
  • Development of a Wi-Fi Positioning System for Indoor Navigation

Internet of Things (IoT)

  • Integration of Raspberry Pi with IoT Sensors for Environmental Monitoring
  • Design and Deployment of a Smart Agriculture System Using IoT
  • Analysis of CoAP vs. MQTT Protocols for IoT Communication
  • Implementation of Blockchain for Securing IoT Devices
  • Development of an IoT-based Smart Home Automation System

Network Management

  • Development of a Network Monitoring Dashboard Using Grafana
  • Configuration Management Automation Using Ansible
  • Analysis of Network Traffic Patterns Using Packet Sniffing
  • Implementation of Load Balancing Algorithms in a Web Server Cluster
  • Development of a Bandwidth Management System Using Traffic Shaping Techniques

Cloud Networking

  • Design and Deployment of a Virtual Private Cloud (VPC) on AWS
  • Analysis of Cloud Storage Solutions (e.g., AWS S3, Google Cloud Storage)
  • Implementation of Serverless Computing Using AWS Lambda
  • Development of a Multi-Cloud Networking Solution for Hybrid Deployments
  • Design and Implementation of Container Orchestration Using Kubernetes

Network Simulation and Modeling

  • Simulation of Network Congestion Control Algorithms (e.g., TCP Vegas)
  • Analysis of Network Performance Metrics Using Network Simulation Tools (e.g., ns-3)
  • Development of a Custom Network Simulator for Educational Purposes
  • Implementation of Software-Defined Networking (SDN) Using Mininet
  • Design and Simulation of IoT Networks Using OMNeT++

VoIP and Video Streaming

  • Implementation of VoIP Call Quality Monitoring System
  • Analysis of Codecs for VoIP Communication (e.g., G.711 vs. Opus)
  • Development of a Video Streaming Service Using WebRTC
  • Implementation of QoS Mechanisms for VoIP Traffic Prioritization
  • Design and Deployment of a SIP-based VoIP Server

Network Performance Optimization

  • Analysis of TCP Congestion Control Algorithms (e.g., Reno vs. Cubic)
  • Development of a Content Delivery Network (CDN) for Web Applications
  • Implementation of Caching Techniques for Accelerating Web Page Loading
  • Design and Optimization of Network Routing Protocols
  • Development of a Network Traffic Analysis Tool for Performance Monitoring

Network Resilience and Fault Tolerance

  • Implementation of Redundant Routing Protocols for High Availability
  • Analysis of Spanning Tree Protocol (STP) Variants for Loop Prevention
  • Development of a Fault Tolerant File Transfer System
  • Design and Deployment of a Disaster Recovery Plan for Network Infrastructure
  • Implementation of Link Aggregation (LACP) for Load Balancing and Redundancy

Network Virtualization

  • Design and Implementation of Network Function Virtualization (NFV)
  • Analysis of Software-Defined WAN (SD-WAN) Solutions
  • Development of a Virtualized Network Environment Using VMware NSX
  • Implementation of VLANs for Network Segmentation
  • Design and Deployment of Virtual Private Network (VPN) Services

Social and Ethical Implications of Networking

  • Analysis of Privacy Concerns in Social Media Networks
  • Development of Tools for Detecting Fake News Propagation in Social Networks
  • Implementation of Content Filtering Systems for Internet Safety
  • Design and Deployment of Secure Communication Channels for Online Collaboration
  • Analysis of Cybersecurity Threats and Countermeasures in Social Networking Platforms

What Are Some Ideas For A Computer Networking Graduation Project?

  • Design and Implementation of a Campus-wide Network Infrastructure
  • Design a network infrastructure for a campus environment, considering factors like scalability, security, and bandwidth requirements.
  • Implement the designed network, including routers, switches, access points, and security measures.
  • Test and optimize the network performance under different scenarios.
  • Development of a Secure Remote Access Solution
  • Design and implement a secure remote access solution using VPN technologies.
  • Evaluate different VPN protocols and encryption methods for securing remote connections.
  • Develop a user-friendly interface for managing remote access permissions and policies.
  • Analysis and Optimization of Wireless Network Performance
  • Conduct a comprehensive analysis of wireless network performance in a specific environment (e.g., office, campus).
  • Identify factors affecting signal strength, interference, and throughput.
  • Propose optimization techniques such as antenna placement, channel allocation, and access point configuration to improve performance.
  • Implementation of Network Monitoring and Management System
  • Develop a network monitoring and management system capable of monitoring network devices, traffic, and performance metrics.
  • Implement features for alerting administrators about network anomalies or failures.
  • Incorporate automation capabilities for configuration management and troubleshooting.
  • Deployment of Software-Defined Networking (SDN) Solution
  • Design and deploy an SDN infrastructure using open-source platforms like OpenFlow or OpenDaylight.
  • Explore use cases for SDN, such as traffic engineering, load balancing, and security policy enforcement.
  • Evaluate the performance and scalability of the SDN solution compared to traditional networking approaches.
  • Development of a Network Security Assessment Tool
  • Create a tool for assessing the security posture of a network infrastructure.
  • Include features for vulnerability scanning, penetration testing, and security policy compliance checks.
  • Provide comprehensive reports and recommendations for enhancing network security.
  • Design and Implementation of a Multi-Cloud Networking Solution
  • Design a multi-cloud networking architecture for seamlessly connecting resources across different cloud providers.
  • Implement features for dynamic routing, traffic prioritization, and load balancing across cloud environments.
  • Evaluate the performance and reliability of the multi-cloud networking solution under varying workload conditions.
  • Analysis of IoT Networking Protocols and Security
  • Investigate different IoT networking protocols (e.g., MQTT, CoAP, Zigbee) and their suitability for various IoT applications.
  • Assess the security vulnerabilities and challenges associated with IoT devices and networks.
  • Propose and implement security mechanisms to mitigate IoT-related threats and risks.
  • Development of a Network Traffic Analysis Tool
  • Create a tool for analyzing network traffic patterns, identifying bottlenecks, and detecting anomalies.
  • Utilize packet capturing and analysis techniques to monitor network traffic in real-time.
  • Incorporate visualization features for representing network traffic data in an intuitive manner.
  • Deployment of a High-Performance Content Delivery Network (CDN)
  • Design and deploy a CDN infrastructure for delivering web content efficiently to users worldwide.
  • Optimize content caching, replication, and distribution strategies to minimize latency and improve user experience.
  • Evaluate the CDN’s performance and scalability under different traffic loads and geographical distributions.

These graduation project ideas cover a diverse range of topics within computer networking, allowing students to explore areas of interest and apply their knowledge and skills to real-world challenges.

In conclusion, embarking on data communication and networking micro project topics is an excellent way for beginners to gain practical experience and deepen their understanding of key concepts.

Whether it’s exploring network protocols, enhancing security measures, or experimenting with wireless communication, there are plenty of exciting project ideas to choose from.

By diving into these projects, beginners can develop valuable skills that will serve them well in their journey towards becoming proficient network engineers or administrators.

  • australia (2)
  • duolingo (13)
  • Education (284)
  • General (77)
  • How To (18)
  • IELTS (127)
  • Latest Updates (162)
  • Malta Visa (6)
  • Permanent residency (1)
  • Programming (31)
  • Scholarship (1)
  • Sponsored (4)
  • Study Abroad (187)
  • Technology (12)
  • work permit (8)

Recent Posts

Top 10 Colleges For Study Abroad For Indian Students

Research on the use of communication big data and AI artificial intelligence technology to construct telecom fraud prevention behavior portrait

New citation alert added.

This alert has been successfully added and will be sent to:

You will be notified whenever a record that you have chosen has been cited.

To manage your alert preferences, click on the button below.

New Citation Alert!

Please log in to your account

Information & Contributors

Bibliometrics & citations, view options, index terms.

Computing methodologies

Machine learning

Machine learning approaches

Information systems

Information systems applications

Data mining

Security and privacy

Human and societal aspects of security and privacy

Intrusion/anomaly detection and malware mitigation

Social engineering attacks

Social and professional topics

Computing / technology policy

Computer crime

Recommendations

Fraud detection and prevention in e-commerce: a systematic literature review.

The high volume of money involved in e-commerce transactions draws the attention of fraudsters, which makes fraud prevention and detection techniques of high importance. Current surveys and reviews on fraud systems focuses mainly on ...

  • This study reviews 64 articles on fraud detection and prevention for e-commerce.

Comprehensive study on methods of fraud prevention in credit card e-payment system

Due to the increasing demand on electronic payment, fraud methods also increasing which resulted in losing millions of Riyals worldwide each year. Several ways have been applied to fight against fraud, therefore, fraud prevention is becoming a vital ...

Research on Credit Card Fraud Detection Model Based on Distance Sum

Along with increasing credit cards and growing trade volume in China, credit card fraud rises sharply. How to enhance the detection and prevention of credit card fraud becomes the focus of risk control of banks. This paper proposes a credit card fraud ...

Information

Published in.

Netherlands

Publication History

Author tags.

  • Telecom fraud prevention
  • communication big data
  • artificial intelligence (AI) technology
  • behavior portraits
  • telecommunication networks
  • fraud detection
  • machine learning
  • behavioral indicators
  • fraud threats mitigation
  • Research-article

Contributors

Other metrics, bibliometrics, article metrics.

  • 0 Total Citations
  • 0 Total Downloads
  • Downloads (Last 12 months) 0
  • Downloads (Last 6 weeks) 0

View options

Login options.

Check if you have access through your login credentials or your institution to get full access on this article.

Full Access

Share this publication link.

Copying failed.

Share on social media

Affiliations, export citations.

  • Please download or close your previous search result export first before starting a new bulk export. Preview is not available. By clicking download, a status dialog will open to start the export process. The process may take a few minutes but once it finishes a file will be downloadable from your browser. You may continue to browse the DL while the export process is in progress. Download
  • Download citation
  • Copy citation

We are preparing your search results for download ...

We will inform you here when the file is ready.

Your file of search results citations is now ready.

Your search export query has expired. Please try again.

Latest Communication Network Topics

The broadcast of raw or processed information over a series of systems/devices is said to be Network communication. Our research communication network topics assist scholars who are interested in expanding their knowledge in the area of Network Communication. 

This page is intended to deliver the top-notch modern innovations, new research issues, and solutions adopted in the fields of communication network!!!

What is Communication Network?

Network Communication is a colossal pool of Data Communications and Networking technologies. On one hand, it involves core functionalities of signals transmission as encoding, interfacing, signal integrity, multiplexing , etc. On other hand, it incorporates topology and architecture used to interconnect devices.

How does Communication happen over Network?

The application software makes communication achievable to transmit data through communication devices as modems, cables, ports, etc. As a medium of data transport, the communication channel is used to share data from one network device to another.

Communication Medium for Wired/Wireless Network

  • Radio Frequencies
  • Satellite, etc.
  • Wired Network  – Interact in terms of physical cables or wires

To support your study deeply in all aspects, we have well-established technical professionals in both research and system development teams. For your ease, our research team has given you top-trending research domains in Communication Network .

Latest Interesting Research Communication Network Topics  

  • Optical Networking 
  • Ubiquitous Networks
  • High-Speed Networks 
  • Adhoc Networks
  • Wireless Sensor Networks 
  • Next Generation Internet 
  • Internet and Web Applications 
  • Measurement and Performance Analysis 
  • Heterogeneous Wireless Networks 
  • Peer-Peer and Overlay Network 
  • Network Operations and Management 
  • Architectures of Network
  • Management of QoS and Resources 
  • Mobile Networks and Wireless LAN 
  • Network Protocols
  • Wireless Networks 
  • Routing, Switching, and Addressing Methods 
  • Self-Organizing Networks and Networked Systems 

Also, we have suggested you few more trends that grab the attention of current scholars. Our resource team is more precise and expert in identifying the problem and choosing problem-resolving solutions as algorithms, methods, or protocols .

Network Communication Topics 

  • Energy Efficiency in networks
  • Information-Centric Networking
  • Information Security and Privacy
  • Interference Management and Mitigation
  • Edge and Fog Computing or
  • Networking Projects
  • Dynamic Spectrum Allocation and Sharing
  • Fault Tolerance, Reliability, and Survivability

To the great extent, we also support you in paper writing and publication through a crew of native writers. If you are looking for top-experts guidance in your manuscript works then you can approach us. 

Our experts provide you with thorough backing support starting from choosing novel communication network topics to reputed journal selection to paper publication . More importantly, we have domain specialists and editors to help you in the paper revision phase. And, we are always prepared to answer the reviewer’s comments on your paper for a faster acceptance.

Our Frequent Decisions from Journals

Minor Revision : This category of papers is appraised optimistic but requires minor add-ons such as new experiments, proofs, or executions. 

  • Here, we have resubmitted those papers with suitable minor revisions. 
  • To be specific, we make clear “how the revisions answer the reviewer’s comments” with a well-marked response. 
  • Then, the revised paper will be reexamined for further acceptance

Accept : This category of papers will be accepted directly at the time of submission. Well-ordered and well-written response letters can avoid re-review. The editor will go through the revisions that you have done and may accept the manuscript outright. For your information, here we emphasized our methods of responding reviewer’s comments. Surely, it elevates your paper’s quality and impresses the reviewers. 

How do we prepare a revised paper?  

  • When we receive initial peer reviews, we take them into consideration. Then, answer all the opinions from each reviewer in the resubmission cover letter. 
  • In the case of more comments, we do it and resubmit the manuscript. 
  • In the case of revisions, we answer and prepare the response to reviewer comments. 
  • We strictly avoid the argumentative tone while responding to reviewer comments and are gentle but outspoken. Also, we feel free to prove our points through solid proof. 

On the whole, we are willing to lend our helping hand in each phase of your research study . To be sure, our service in crafting best communication network topics makes you feel happy throughout your journey.

IAFC_logo

  • Board of Directors
  • Position Statements
  • Communications
  • Constitution, Bylaws & Resolutions
  • Emergency Management
  • Hazardous Materials
  • Human Relations
  • Tech Council
  • Terrorism and Homeland Security
  • Training and Education Development
  • Urban Search & Rescue
  • Wildland Fire Policy
  • COS Resources
  • Coaching Program
  • EVMS Elections
  • About EMS Section
  • Latest Updates
  • Recommended Reading
  • FRM Conference
  • Heart Safe Community Awards
  • James O. Page Award
  • EFO Election
  • Executive Fire Officer Program (EFOP)
  • EFO Symposium & Awards
  • Federal & Military Fire Services
  • FLSS Resources
  • FLSS Awards
  • Low Frequency Alarm Committee
  • IFSS Updates
  • Metro Chiefs
  • Meet the SHSS Board
  • SHSS Election
  • SHSS Resources
  • SHSS Awards
  • Volunteer & Combination Officers
  • Bugle Partners
  • Bugle Program
  • Careers at IAFC
  • Career Center
  • International Fire Service Research Center and Policy Institute
  • Chief Officers
  • Company Officers
  • Conferences
  • Officer Development Program Leadership Development Certification Series
  • IFP Frequently Asked Questions
  • Online Learning
  • IAFC Academy
  • Webinar Library
  • Comprehensive Opioid, Stimulant & Substance Abuse Program
  • Technology Council
  • IAFC Frequency Coordination
  • UAS Toolkit
  • Department Administration
  • Fire Prevention
  • Lithium-Ion and Energy Storage Systems
  • Large-Scale Response
  • Our Facilitators
  • LMA Conference
  • Services & Products
  • Wellness/Fitness Program Summary
  • Candidate Physical Ability Test
  • IAFC Recruiting App
  • Suppression News
  • Fire Adapted News
  • Wildland Landscapes News
  • Wildland Policy News
  • News Details
  • Position Details
  • Wildland Events
  • Wildland Resource
  • Wildland News
  • All Resources
  • Buyer's Guide
  • Consulting Services
  • Grant Funding
  • Affordable Care Act
  • Federal Taxation
  • Homeland Security
  • Volunteer and Combination
  • Wildland Fire
  • Contact NMAS
  • Hurricane Preparation/Response
  • Chief's Edge
  • Community Risk Reduction
  • Fire-Rescue International
  • Fire-Rescue Med
  • Hazmat Conference
  • Symposium in the Sun
  • Technology Summit International
  • WUI Conference
  • Upcoming Events
  • Life Membership
  • Update Profile
  • Member Benefits
  • Get Involved
  • KnowledgeNet
  • Bugle Brief
  • Daily Dispatch

Subscribe to IAFC email

For one reason or another (content that's expired or been removed, mis-typed URL, faulty referral from another site, out-of-date search engine listing, etc.) the page you were after is not here.

What to do now?

  • Try a site search
  • Get in touch to ask for what you're after
  • View the site map

If you still can't find what you're looking for,  let us know .

International Association of Fire Chiefs

  • Terms of Use & Copyright
  • Privacy Policy
  • IAFC Logo Usage Policy
  • Discrimination & Harassment Policy

8251 Greensboro Drive, Suite 650, McLean, VA 22102 | Tel: 703-273-0911 © 1999 - 2024 International Association of Fire Chiefs. All Rights Reserved.

Data Communications and Networking Issues in Real World

  • December 2020

Kavishka Hirushan at Sabaragamuwa University of Sri Lanka

  • Sabaragamuwa University of Sri Lanka

Abstract and Figures

The traffic growth between machine to machine & machine to user

Discover the world's research

  • 25+ million members
  • 160+ million publication pages
  • 2.3+ billion citations

Muhammad DANIEL ALIF Jumairi

  • Recruit researchers
  • Join for free
  • Login Email Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google Welcome back! Please log in. Email · Hint Tip: Most researchers use their institutional email address as their ResearchGate login Password Forgot password? Keep me logged in Log in or Continue with Google No account? Sign up

research topics in data communication and networking

Network Communication Projects

Network Communication Projects connect each element in the network by firm links. For any network, Communication is the key that aids in attaining its objective. To explain this, each node in the network needs a way to exchange its data (text as well as multimedia) to other nodes. Here, the Communication sets medium between those nodes in the network. The medium may be wireless channels, optical cables, or wired cables. In any form, its objective is the same. 

WHAT IS THE CURRENT STATUS?

   At the moment, Communication stands at the edge of 5G and moves towards 6G. In, Transmitters and Receivers are vital for the most part. Network projects both of them, Antenna enables the intended process. In the light of antenna techs, Multiple-Input-Multiple-Output (MIMO) becomes the notable one. Former, MIMO, and massive MIMO are mostly used in Base Station and Sinks as well as on user devices. Later, all network nodes use the MIMO for better performance. 

   On the one hand, network communications evolve from day to day. On the other hand, still, there is a lot of issues that need attention. 

Research Issues that Affect Network Communication Projects

  • Interference among channels and users
  • Heterogeneity of resources and devices
  • Energy holes during relay-based Communication
  • Channel Fading and Blocking
  • Reliability Issues due to lack channel information
  • Security and Privacy for communicating entities

Top 25 research ideas for network communication projects

   The present research is ongoing on all the above issues. To tackle them, more advanced techs are there. To start with advanced techs, it is main to know about the base. The keyway outs for these issues include in the below.

  • Uplink and Downlink Synchronization (i.e.) Initial Ranging
  • Interference Cancellation during Resource Allocation
  • Geo-location Management for Data Dissemination
  • Broadcast Storm Mitigation by Optimal Broadcasting
  • Energy-Efficient Network Management and Node Deployment
  • Reliable Data Transferring by Error-Coding Technique
  • Secure Communication is driven by Lightweight Cryptography.

   In broad, Network Communication Projects carry over Single-hop or Multi-hop. In detail, both of them depend upon the routing (single as well as multipath) process. As well, we gathered notable solutions from various classes for you. 

WHAT are THE RECENT TRENDS?

Wireless solutions over network communication projects.

  • mmWave and THz band for LOS and NLOS Systems
  • High-Speed Packet Access (HSPA) and HSPA+
  • Telecommunication Standards (6G, 5G, LTE-M, LTE-A, LTE, etc.)
  • Massive and Multi-User MIMO Beamforming
  • WiFi-based Communication (Now uses IEEE 802.11ay)
  • AUV, UAV, and also Drone Communication 
  • Green and Molecular Communication 

Applicable Areas

  • Internet of Things (Smart Home, Smart city, etc.)
  • Wireless Monitoring (Disaster, Wildlife, etc.)
  • Military and Tactile Networks

Optical Solutions over Network Communication 

  • Optical Circuit Switching and Burst Switching
  • Dense WDM along with Optical Cross Connects
  • Orbital Angular Momentum Multiplexing Model
  • Optical Mesh and Transport Data Transmission
  • Visual MIMO System for Large-Scale Networks
  • Submarine Data Transmission
  • Flying Vehicle Communication
  • Industrial Automation

   To be sure, Wireless and Optical are the two main branches of Communication. In the point of fact, wireless suits for short and long-range while optical means for ultra-long range. Most of the networks like SDN, WSN, CRN, Computer Networks, and PhD projects in Ad-hoc network have these as the base. In addition to these, NoC and SoC systems also use these techs for data exchange. By revolution in each day, now we tend to witness the Optical Wireless (i.e.) hybrid system.

Optical Wireless Communication in Networks

  • Point-to-point Terrestrial Free-space Transmission
  • Light Fidelity (Li-Fi) by Electro and Radio Frequency
  • Ultraviolet, Infrared, and Visible Light Communication
  • Ultra-short and also Ultra-long Range Systems
  • OWC Over Next-Gen Access and Core Networks
  • Wireless Body Area Communication
  • Satellite Links
  • Vehicular Communications (V2X)

   Everyone may have ideas, but pros only can show the feats. As of now, we build 10K+ networking projects in all fields. Still, our clients are at home with us for their future works. This is because they know the worth of our keen help. Know-how our assist at least once, surely you will stay and travel with us. Just ring us and find more and more stuff.

Technology Ph.D MS M.Tech
NS2 75 117 95
NS3 98 119 206
OMNET++ 103 95 87
OPNET 36 64 89
QULANET 30 76 60
MININET 71 62 74
MATLAB 96 185 180
LTESIM 38 32 16
COOJA SIMULATOR 35 67 28
CONTIKI OS 42 36 29
GNS3 35 89 14
NETSIM 35 11 21
EVE-NG 4 8 9
TRANS 9 5 4
PEERSIM 8 8 12
GLOMOSIM 6 10 6
RTOOL 13 15 8
KATHARA SHADOW 9 8 9
VNX and VNUML 8 7 8
WISTAR 9 9 8
CNET 6 8 4
ESCAPE 8 7 9
NETMIRAGE 7 11 7
BOSON NETSIM 6 8 9
VIRL 9 9 8
CISCO PACKET TRACER 7 7 10
SWAN 9 19 5
JAVASIM 40 68 69
SSFNET 7 9 8
TOSSIM 5 7 4
PSIM 7 8 6
PETRI NET 4 6 4
ONESIM 5 10 5
OPTISYSTEM 32 64 24
DIVERT 4 9 8
TINY OS 19 27 17
TRANS 7 8 6
OPENPANA 8 9 9
SECURE CRT 7 8 7
EXTENDSIM 6 7 5
CONSELF 7 19 6
ARENA 5 12 9
VENSIM 8 10 7
MARIONNET 5 7 9
NETKIT 6 8 7
GEOIP 9 17 8
REAL 7 5 5
NEST 5 10 9
PTOLEMY 7 8 4

Related Pages

Network Projects

Communication Projects

Network Research Projects

5g Communication Projects

Network Routing Projects

Wireless Communication Projects

5g Wireless Communication Projects

M2m Communication Projects

V2x Communication Projects

Machine Type Communication Projects

Ultra Wideband Communication Projects

Network Routing Algorithms Projects

Underwater Sensor Network Projects

Network Routing Protocols Projects

Handover Mobile Wireless Communication Network Projects

research topics in data communication and networking

YouTube Channel

Unlimited Network Simulation Results available here.

IMAGES

  1. (PDF) Data Communications and Computer Networks

    research topics in data communication and networking

  2. Research Networking Project Topics for Engg/PhD/MS Scholars

    research topics in data communication and networking

  3. List of Research Topics in Networking and Communication

    research topics in data communication and networking

  4. PPT

    research topics in data communication and networking

  5. PPT

    research topics in data communication and networking

  6. Introduction to Data Communications and Networking

    research topics in data communication and networking

VIDEO

  1. Lec-9 Data Communication & Networking (NCD)

  2. Topic 8 (Part 1): Fundamentals of Information Technology-Data Communications and Computer Networks

  3. Data Communication & Networking (Objective Questions)

  4. Data Communication and Network |Rapid Revision 02|NSJ Online Academy

  5. Lec2 DataCommunication NetworkModels

  6. Data Communication & Networking (Internetworking)

COMMENTS

  1. 15 Latest Networking Research Topics for Students

    Explore a curated list of 15 research topics covering the networking field with their respective possible methodology, research questions, and objectives. ... H. et al. (2023) "Game theory in network security for Digital Twins in industry," Digital Communications and Networks [Preprint]. Gill ... (2022) "Dataset of network simulator ...

  2. Frontiers in Communications and Networks

    Emerging Technologies, Challenges and Solutions for Zero Trust. An innovative journal that explores the critical branches of contemporary telecommunications in our hyper-connected world, from the physical layer to cross-layer and networking design, performance ...

  3. PUBLICATIONS

    20. Randall Berry and Eytan Modiano, "'The Role of Switching in Reducing the Number of Electronic Ports in WDM Networks," IEEE Journal of Selected Areas in Communication, October, 2004. 19. Jun Sun and Eytan Modiano, "Routing Strategies for Maximizing Throughput in LEO Satellite Networks,," IEEE JSAC, February, 2004.

  4. Data Communication and Networking Research Topics

    In the areas of networking and data communication, there are different fascinating project strategies emerging recently that align with the modern technologies. We suggest the following various advanced research topics that have the opportunity to dedicate aspects to the field meaningfully: 5G and Beyond: Next-Generation Wireless Networks.

  5. Frontiers in Communications and Networks

    University of North Carolina at Charlotte. Charlotte, United States. Associate Editor. Data Science for Communications.

  6. Advancements and Challenges in Networking Technologies: A Comprehensive

    This survey paper provides a comprehensive overview of emerging technologies in networking, focusing on caching in Information-Centric Networking (ICN), context-aware radio access technology (RAT) selection in 5G ultra-dense networks, cryptocurrency adoption, and mobility support for routing in Low Power and Lossy Networks (LLNs). Adaptive RAT selection mechanisms are stressed in 5G context ...

  7. PDF Data Communication and Networking: Challenges and Solutions

    networking and communication, analyses the research being done to solve these problems, and discusses possible solutions. This review study seeks to offer insights into the present status

  8. Data sharing practices: The interplay of data, organizational

    With the proliferation of data and advanced analytics, organizations are increasingly recognizing the potential value of sharing data across organizational boundaries. However, there is a lack of empirical evidence and systematic frameworks to guide the design of effective data sharing practices. Realizing the full potential of data sharing requires the effective design and implementation of ...

  9. Computer Networks: Data Communications, Internet and Security

    The hands-on textbook covers both the theory and applications of data communications, the Internet, and network security technology, following the ACM guideline for courses in networking. The content is geared towards upper undergraduate and graduate students in information technology, communications engineering, and computer science.

  10. Dynamic and efficient device collaborations in 5G-advanced and 6G networks

    State Key Laboratory of Mobile Network and Mobile Multimedia Technology, Shenzhen, China. Algorithm Department, Wireless and Computing Research Institute, ZTE Corporation, Shenzhen, China. Correspondence. Xianghui Han, National Mobile Communications Research Laboratory, Southeast University, Nanjing 210096, China. Email: [email protected]

  11. 43493 PDFs

    Explore the latest full-text research PDFs, articles, conference papers, preprints and more on DATA COMMUNICATIONS. Find methods information, sources, references or conduct a literature review on ...

  12. Data Communication and Networking: Challenges and Solutions

    This review paper explores the key challenges encountered in data communication and networking and discusses potential solutions to address these issues. This report offers insights into the present status of research and shows the ongoing attempts to address these difficulties through an analysis of relevant articles and journals. The results ...

  13. PDF Challenges in Data Communication and Networking

    [email protected]. Abstract—Data transmission and networking are key components of modern technology, allowing for easy information sharing among devices and networks. However ...

  14. Data Communication and Networks

    Presents outstanding research papers presented at GUCON 2019. Discusses new findings in data communication and networks. Offers a valuable reference guide for researchers and practitioners in academia and industry. Part of the book series: Advances in Intelligent Systems and Computing (AISC, volume 1049) 15k Accesses. 126 Citations.

  15. Mapping the main research themes in digital human resources

    The COVID-19 pandemic sped up the digitalization process and revolutionized the world of the digital employee. And today, advances in artificial intelligence are having a major impact on the field ...

  16. Overview of Data Communication Networks

    Data communication networks deal with the transfer of data between two points. Data originates at the source and is finally delivered to the destination, which is also called a sink. It can also be classified according to the type of medium over which the signal propagates.

  17. Communications and Networking Laboratory

    The Communications and Networking (Commnet) Laboratory in the Department of Electrical and Computer Engineering at Northwestern University is the home to faculty, postdocs, and students interested in communications and networking.. Our research draws on a wide range of techniques including information theory, communication theory, networking, signal processing, optimization methods, and ...

  18. PDF Data communication and Networking: Review

    Data communication and Networking: Review Charles O. Connor Computer Science Murdoch University, Australia ABSTRACT This article is the reviews of data communication and networking. Data communications is the transfer of data (a digital bitstream or a digitized analog signal) over a point-to-point or point-to-multipoint communication channel.

  19. A Brief Study on Data Communication and Computer Networks

    Cable or wireless media are used to establish connections (network links) between nodes. The Internet is the most well-known computer network. Network nodes are computer devices that originate, transport, and terminate data on a network. Hosts such as personal computers, phones, servers, and networking gear are examples of nodes.

  20. 300+ Communication Research Topics

    Communication Research Topics. Communication Research Topics are as follows: The effectiveness of nonverbal communication in virtual interactions. Cross-cultural communication in multinational corporations. The role of social media in shaping public opinion. The impact of technology on interpersonal communication skills.

  21. Internet & Technology

    ABOUT PEW RESEARCH CENTER Pew Research Center is a nonpartisan, nonadvocacy fact tank that informs the public about the issues, attitudes and trends shaping the world. It does not take policy positions. The Center conducts public opinion polling, demographic research, computational social science research and other data-driven research.

  22. 50+ Data Communication And Networking Micro Project Topics [Revised]

    Understanding Data Communication and Networking. Data communication involves the transmission and reception of data between two or more devices. Networking refers to the interconnection of multiple devices to share resources and information. These concepts form the foundation of modern communication systems, enabling seamless connectivity.

  23. Research on the use of communication big data and AI artificial

    The study explores the integration of communication AI and Big Data technologies, focusing on the perspective of artificial intelligence. By using insights obtained from a telecom fraud detection model that relies on users' behavior variations expressed through time-varying signatures, the goal of this study is to enhance fraud prevention ...

  24. Data Communication and Networking: Challenges and Solutions

    A lack of bandwidth can present several problems for. networking and data communication. Network congestion, where th e bandwidth is not enough to handle the volume of. traffic, is one of the mai ...

  25. Latest Communication Network Topics

    Our research communication network topics assist scholars who are interested in expanding their knowledge in the area of Network Communication. ... Network Communication is a colossal pool of Data Communications and Networking technologies. On one hand, it involves core functionalities of signals transmission as encoding, interfacing, ...

  26. Fire Service Quick Incident Response Workbook for Civil Unrest and

    Recognizing the challenges that fire chiefs can suddenly find themselves in, the International Association of Fire Chiefs, Homeland Security and Terrorism Committee set out to create a Fire Service Quick Incident Response Workbook for Civil Unrest and Disturbance to help fire chiefs prepare for and when required, better respond to periods of civil unrest.

  27. Data Communications and Networking Issues in Real World

    The data communication is made easy using the networks. But still the data communication &. networking technology no fully matured. There are issues from several areas starting from the. designing ...

  28. Research Topics for Network Communication Projects

    Later, all network nodes use the MIMO for better performance. On the one hand, network communications evolve from day to day. On the other hand, still, there is a lot of issues that need attention. Research Issues that Affect Network Communication Projects. Interference among channels and users; Heterogeneity of resources and devices