Miniprojects 2024-2025

Id Project Description Link/Notes Students
QoS Network Emulation with Realistic Traffic Types Build an emulated network in Mininet, including video streaming, email/messaging, and file download servers to generate realistic application-level traffic. 3 servers (1 per type of traffic), 2 clients exchanging traffic with all servers and 3 switches (1 per client and 1 for all the servers). Configure a packet scheduling policy on the switches to prioritize streaming over download over emails. Amir SANJAKDAR, Amir RAZZAQ ,Akash BALAMURUGAN, Jia Jie XU
Traffic Distribution Crafting and Evaluation of Scheduling Policies: DRR vs SP Use Scapy to craft three different traffic distributions: Constant Bit Rate, Variable Bit Rate and Pareto distribution of packet size. Create a Mininet topology where three hosts send the generated traffic to a fourth host, through a switch. Compare the latency, packet loss and completion time of the traffic distributions using two scheduling policies in the switch: Deficit Round Robin and Strict Priority Scheduling (arbitrary parameters) ZERRAD Adan, EL GARAH Itminene, SIVANESAN Stéphane, N'DIAYE Waly
Traffic Distribution Crafting and Evaluation of Scheduling Policies: DRR vs Shaping Use Scapy to craft three different traffic distributions: Constant Bit Rate, Burst Traffic and Exponential Distribution of inter-arrival time. Create a Mininet topology where three hosts send the generated traffic to a fourth host, through a switch. Compare the latency, packet loss and completion time of the traffic distributions using two scheduling policies in the switch: Deficit Round Robin and Traffic Shaping (arbitrary parameters) ASSOUL Lydia, BANTIKOS Nicolas, Aldea Palamani
Containerisation of real-time federated Learning agents with Kafka Containerizing data pipeline system and the federated learning functions using docker containers Data pipeline system and functions to containerize: https://gitlab.roc.cnam.fr/data-pipeline-system-designs-for-in-network-learning
function description in the paper: https://hal.science/hal-04681121
AMEUR Samia,  GUEDAIEM Marwan, MEDDAH Khaled Fouad,  BENELMIR Rami
Containerisation of real-time federated Learning agents with RabbitMQ The current data pipeline system is based on the publish/subscribe model implemented with Apache Kafka. Replace the Apache Kafka by RabbitMQ and containerize the functions of the data pipeline system and the federated learning functions using docker container.
RabbitMQ: https://www.rabbitmq.com/
Data pipeline system and functions to containerize: https://gitlab.roc.cnam.fr/data-pipeline-system-designs-for-in-network-learning
function description in the paper: https://hal.science/hal-04681121
KHAN Muneeb, GHOUT Sofiane, GABLI Wassif-Eddine, SOILIHI Djouhoudi
Containerisation of real-time federated Learning agents with ZENOH The current data pipeline system is based on the publish/subscribe model implemented with Apache Kafka. Replace the Apache Kafka by ZENOH and containerize the functions of the data pipeline system and the federated learning functions using docker container.
ZENOH: https://github.com/eclipse-zenoh/zenoh
Data pipeline system and functions to containerize: https://gitlab.roc.cnam.fr/data-pipeline-system-designs-for-in-network-learning
function description in the paper: https://hal.science/hal-04681121
Sait Tinhinane, Ismail Mustafa, KOLINGBA Aaron, Iratni Mounira
Comparison of packet delivery ratio (PDR) for LoRaWAN with and without FHSS option (Direct to satellite) This project compares the packet delivery ratio (PDR) of LoRaWAN with and without Frequency Hopping Spread Spectrum (FHSS) to evaluate its impact on communication reliability in IoT applications when connecting to the satellite.
https://github.com/MuhammadAsadUllah1/Analysis-and-Simulation-of-LoRaWAN-LR-FHSS
ABDELHAK Razi, ALEXANDRE KIDNEY PERKS, MOHAMED Asri, EMEL Tatoglu 
Impact of IoT application data rate on the performance of the network IEEE 802.15.4-TSCH is the foundational PHY and MAC layer for many time-critical industrial IoT technologies, such as ZigBee and WirelessHART. TSCH combines TDMA and FDMA in its MAC layer to ensure high reliability. In TSCH-Sim, change the data traffic of nodes in a given topology scenario from very light (one packet every minute) to very heavy (one packet every 500 milliseconds) to observe how network performance degrades. The simulation can be conducted for topologies with 10, 20, 40, 80, 160, and 320 nodes. https://github.com/edi-riga/tsch-sim
For those prefer C programing can use Contiki-ng instead of Tsch-sim:
https://docs.contiki-ng.org/en/master/doc/tutorials/TSCH-and-6TiSCH.html
Hibat allah ZINE EL AABIDINE, Hayoub MOUFFOK, Nuno SOARES, Amordei BOLENGE, Ismail YADEN
Malware detection with supervised learning Use CTU-13 dataset to train an ML/DL model to detect Malware (data preprocessing is required) https://mcfp.felk.cvut.cz/publicDatasets/CTU-Malware-Capture-Botnet-42/detailed-bidirectional-flow-labels/capture20110810.binetflow MAOUCHE Naim, ZOLFAGHARI MOGHADDAM Karaneh, IBRAIMO Nacir, PANCHENKO Kristina
Deploy a Honeypot for Network Threat Analysis – ssh and dns Deploy a real-world honeypot on a cloud server. Setup a system featuring a ssh and dns server. Log every incoming connection (e.g., IP address, geographical location, time of day, attack patterns, payloads, traffic volume, login attempts) in a parsable format (e.g., json). @lecnam.net emails should grant a free demo account for students on Azure. ICHALAL Smail,  KHRISSI Hamza, MOUBAYED Ayla,  SALEH Sami 
Deploy a Honeypot for Network Threat Analysis – http(s) and ftp Deploy a real-world honeypot on a cloud server. Simulate a vulnerable system featuring an http(s) and ftp server. Log every incoming connection (e.g., IP address, geographical location, time of day, attack patterns, payloads, traffic volume, login attempts) in a parsable format (e.g., json). @lecnam.net emails should grant a free demo account for students on Azure. ARULANANTHAM Mekkhishan, ALAOUI BELGHITI Hanaa, MENDES VINTENA Victor, JEAN-BAPTISTE Dorian
Container migration – Docker vs Podman Conduct a comparative study of live container migration between two servers using CRIU with Docker and Podman. Examine the differences in downtime, resource usage, and the ease of setup. https://criu.org/Main_Page ABBASSEN mouhcene, DJILI ousama, AMZALI mouloud, Bianca Catarau
Container migration – cri-o vs Docker Conduct a comparative study of live container migration between two servers using CRIU with Docker and cri-o. Examine the differences in downtime, resource usage, and the ease of setup. https://criu.org/Main_Page FREJABUE Anaïs, YAHIATENE Ghiles, NGUYEN Ngoc Anh, KHORSI Rezak
Traffic Engineering in SDN Using OpenFlow Create a Mininet SDN environment with Open vSwitch and an ONOS controller. The topology should include at least 5 nodes and 10 hosts. Implement a dynamic flow rerouting traffic engineering policy based on link utilization. Evaluate the performance impact on latency, throughput, and link efficiency. CLAIR Arnaud, BOUDJEMAHI Meriem, SITANG Ninine, LACHEMOT Cédric
Performance Evaluation of QUIC vs TCP Set up a virtual environment (locally or in the cloud) consisting of a client machine and 2 servers: one configured for QUIC and the other for TCP connections. Simulate different network conditions between the client and the servers, in terms of pkt loss, latency and bit rate. Compare the performance of the two protocols in terms of throughput, latency and handshake completion time. QUIC implementation for servers: https://github.com/cloudflare/quiche
@lecnam.net emails should grant a free demo account for students on Azure.
BESSABIS Abdeldjaoued, KABTANE Rania, MOUSSOUNI Yaakoub, BOUROUCHA Abdelatif.
UE Mobility in 5G Networks with Open5GS and srsRAN Simulate a 5G network using Open5GS as the core network and srsRAN as the RAN. Deploy one UE and 2 gNBs, and simulate the UE moving from the coverage area of one GNb to the other. Measure the handover completion time, as well as the throughput before, during and after the handover. SrsRAN: https://github.com/srsran
Open5GS: https://github.com/open5gs
ROSSIGNOL Paul, SMIDA ZOUINA ROFAIDA, NGUYEN HUU TRUC, FAYE ABDOU AZIZ
UE Mobility in 5G Networks with FREE5GC and OpenAirInterface Simulate a 5G network using FREE5GC as the core network and OpenAirInterface as the RAN. Deploy one UE and 2 gNBs, and simulate the UE moving from the coverage area of one GNb to the other. Measure the handover completion time, as well as the throughput before, during and after the handover. FREE5GC: https://github.com/free5gc/free5gc
OpenAirInterface RAN:
https://openairinterface.org/oai-5g-ran-project/
https://gitlab.eurecom.fr/oai/openairinterface5g/
Myriame BCHIR, Ena IDDIR, Katia TERRACHET, Antoine RAYMOND
UE Mobility in 5G Networks with ns-3 LENA 5G Simulator Simulate a 5G network in ns-3, using the Evolved Packet Core module as the core network and the LENA 5G module as the RAN. Use the mobility models available in ns-3 to move one UE in the simulation area, recreating two scenarios: linear path through gNB areas, and circular path around a cluster of 3 gNBs. Measure the handover completion time, as well as the throughput before, during and after the handover.
LENA 5G: https://cttc-lena.gitlab.io/nr/html/
Doroteja Petrovic, FOREST Salim, Dysan Nebugath-nacher
Comparative Study of SDN Controllers: Faucet, ONOS, and OpenDaylight Set up and evaluate three SDN controllers (Faucet, ONOS, ODL) using a Mininet network with multiple OpenFlow switches arranged in a 3-tier topology. Compare the controllers’ performance in terms of latency and goodput (intended as the ratio between the successfully transmitted user traffic to total traffic, including packet loss and control plane overhead). Conduct the evaluation under increasing traffic loads and number of switches. Implement additional features such as telemetry and QoS policies, assessing the ease of deployment for each controller. Faucet: https://faucet.nz BENDAKIR Aymen, ALLOUACHE Ayhem, ZORGANI Rayene Nassim
Emulating Lifecycle Management of Virtualized Network Functions Demonstrate the use of the VNF LCM Emulator, developed by the ETSI Industry Specification Group for Network Functions Virtualization (ISG NFV). Article: https://superuser.openinfra.dev/articles/emulating-lifecycle-management-of-virtualised-network-functions/
Tool: http://tools.etsi.org/vnf-lcm-emulator/
BOUCHEFIRAT Loukmane, BOUTEBICHA Ihssan, FELIH Riad, FERRAHI Kamel-soaid
BPP packet trimming Demo Demonstrate the use of the packet trimming technique to implement In-Network Video Quality Adaption. Papers:
https://discovery.ucl.ac.uk/id/eprint/10171122/1/icin_2023.pdf
https://dl.acm.org/doi/pdf/10.1145/3458305.3478440
MESBAHI Said, SEHAKI Thamila, SLAMANI Lila, DAOUI Mokrane Walid
P4-UPF Demonstrate the implementation of a 5G core UPF on a P4 switch, using the BMv2 software switch. https://dl.acm.org/doi/pdf/10.1145/3482898.3483358 HAMMOUDI Nasreddine, BA Sokhna Khadijatou
NWDAF OAI Demonstration Demonstrate the Network Data Analytics Function features using the OpenAir Interface implementation https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-nwdaf
https://gitlab.eurecom.fr/oai/cn5g/oai-cn5g-nwdaf/-/blob/master/docs/TUTORIAL.md
Walid Berrouk, Lyna Ait Kaci, Imene Silakehal, Yasmine Si Chaib
Omnipaxos for replication and fault-tolerance in Virtual Network Functions Demonstrate the features of Omnipaxos to handle replication and fault-tolerance of a system featuring load balancing and firewall VNFs deployed over a scalable number of VMs (or containers). Showcase the response of the system to the events of network failure and abrupt VM shutdown. https://omnipaxos.com/
https://github.com/haraldng/omnipaxos/tree/master
ELMOKRETAR Nour elhouda nada, MOUINE Youssef, TAHIR Issam, Zhong Yufei
Threat Assessment & Response System AI model for automated penetration testing Demonstrate the use of TARS AI Agents system to perform cybersecurity penetration testing of at least 5 websites of your choice. Assess the capability of the system and comment on the major vulnerabilities found and potential countermeasures. https://github.com/osgil-defense/TARS  ARCHA Aya, AMENTAK Nouhaila, DANE Mohamed, SEKHRI Abdelali
Synthetic Data Generation Using Machine Learning - MAWI Implement a generative ML model to create new synthetic data from the MAWI Archive dataset. Assess the quality of the generated data points by providing at least 5 metrics of fidelity and diversity (e.g., comparison of mean/std deviation, KNN). MAWI Archive: https://mawi.wide.ad.jp/mawi/ Telecom GPT  SAMOURA Amadou, Hacene Katia, Jérémy NGUYEN
Synthetic Data Generation Using Machine Learning - 5G3E Implement a generative ML model to create new synthetic data from the 5G End-to-End Emulation dataset. Assess the quality of the generated data points by providing at least 5 metrics of fidelity and diversity (e.g., comparison of mean/std deviation, KNN). 5G3E dataset: https://github.com/cedric-cnam/5G3E-dataset. Telecom GPT Ahmad Jaber, Oladipupo Kola, Hassan Chreif, Ahmad ABDALLAH