Neben unseren regelmäßig stattfindenden Projektveranstaltungen (siehe rechte Spalte) bieten wir zusätzlich eine Reihe von individuellen Einzel- und Gruppenthemen für Projekte an. Diese können je nach Prüfungsordnung als Teil des Projektmoduls im Master eingebracht werden. Beachten Sie, dass in der Liste auch Arbeiten vorkommen, die sowohl als Abschluss- als auch als Projektarbeit ausgeschrieben wurden. Der Schwierigkeitsgrad und Umfang wird dann jeweils nach der Art der Arbeit angepasst.

„Power Consumption Analysis of Storage Architectures in Wireless Sensor Networks,“ Masterarbeit oder Projektarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
Wireless Sensor Networks consist of sensor nodes that utilize low-power wide area networks to periodically transmit sensor readings (e.g., temperature, humidity, pollution levels) to backend services. These sensor nodes are typically battery-powered and their processing capabilities hence limited. This directly results in a trade-off between temporal resolution of transmitted sensor data and battery lifespan. As part of a research project at the Institute of Distributed System, we research novel storage mechanisms at the sensor node to reduce the temporal resolution by default, but still allowing for high-resolution on-demand access of past readings. The goal of this topic is to investigate the power consumption characteristics of LoRa sensor devices in regard to storing sensor readings in non-volatile memory on the sensor node and transmitting data to the network. This problem can be investigated through the means of network simulations (e.g., using the FLoRa framework for OMNeT++ or similar tools) and analytical calculations. Additionally, practical experiments on real LoRa hardware can be performed to validate the analytical results (not absolutely required for the topic).
„Test-based Validation of Network Programming Tasks,“ Projektarbeit, D. Meißner (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2021 – Verfügbar.
We have a collection of Java programming tasks as part of our introduction to computer networks course. In these programming tasks students are instructed to implement network applications matching a strict set of rules. The goal of this project is to implement a rule-based testing framework to aid the grading of such programming tasks and providing immediate feedback to students whether their implementation is correct or not.
„Applications for the LoRaPark Ulm,“ Projektarbeit, F. Kargl (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2020 – Verfügbar.
„Zero Trust SFC enabled HTTP based Multi Factor Authentication,“ Projektarbeit, L. Bradatsch (Betreuung), F. Kargl (Prüfer), Inst. of Distr. Sys., Ulm Univ., 2020 – Verfügbar.
Since Google introduced their BeyondCorp project, Zero Trust (ZT) is one of the most popular buzzwords in the area of network security. In a ZT network, Policy Enforcement Point (PEP) and Policy Decision Point (PDP) are responsible for central authentication and authorization (Auth*). Both mentioned components and conventional security functions such as firewalls work largely independently of each other when it comes to processing packets. This leads to inefficient scenarios in which all packets are processed by time- consuming security functions. By coupling the conventional security functions to the PEP/PDP, higher efficiency in security-relevant packet processing can be achieved. This can be achieved by leveraging the Service Function Chaining (SFC) approach. SFC allows the dynamic chaining of conventional network service functions such as HTTP header enricher or firewalls. For each network flow can be decided what service function should be applied to all the flow's packets. The PEP/PDP in a ZT network acts then as the orchestrator, decides about the functions that should be chained together. By doing this, it can be efficiently decided which function should be applied. The goal of the project is to implement one of the thus orchestrated security service functions namely a Multi Factor Authenticator (MFA) that is embedded in a already existing Zero Trust SFC prototype. The MFA must be HTTP based and written in Go. Requirements: Good knowledge of Go and security protocols).

Reguläre Projekte im Master

Rechnernetze und IT-Sicherheit I und II
4Pj, 8LP, jedes Semester

Verteilte Anwendungen, Plattformen und Systeme I und II
3Pj, 8LP, jedes Semester



Marion Köhler
Claudia Kastner
Emailaddresse Sekretariat
Telefon: +49 731 50-24140
Telefax: +49 731 50-24142


Institut für Verteilte Systeme
Universität Ulm
Albert-Einstein-Allee 11
89081 Ulm


Gebäude O27, Raum 349
89081 Ulm