Wireless Networks and Security | My Assignment Tutor

MN603 Wireless Networks and Security Page#1 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha November, 2020 Assessment Details and Submission GuidelinesTrimesterT3 2020Unit CodeMN603Unit TitleWireless Networks and SecurityAssessmentTypeIndividual Assignment 1AssessmentTitleAnalysis of routing protocols in terms of security, QoS, and energy efficiencyPurpose of theassessment(with ULOMapping)The purpose of the assignment is to analyse the routing protocols and evaluatethem in terms of security, QoS, and energy efficiency. Students will be able tocomplete the following ULOs:a. Compare standards-based technologies used in various networks;b. Test and evaluate various wireless networks performance;Weight10% (Part-A 3% and Part-B 7%)Total Marks100 (Part-A 30 and Part- B 70)Word limit2000 – 2500 words (Part-A 600 -750 words) (Part- B 1400-1750 words)Due DatePart –A Due Week 3 (4/12/2020 11:55PM), Week 7(8/1/2021 11:55PM)SubmissionGuidelines• All work must be submitted on Moodle by the due date.• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)font and 2 cm margins on all four sides of your page with appropriate sectionheadings.• Reference sources must be cited in the text of the report, and listedappropriately at the end in a reference list using IEEE referencing style.Extension• If an extension of time to submit work is required, a Special ConsiderationApplication must be submitted directly on AMS. You must submit thisapplication three working days prior to the due date of the assignment.Further information is available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdefermentAcademicMisconduct• Academic Misconduct is a serious offence. Depending on the seriousness ofthe case, penalties can vary from a written warning or zero marks to exclusionfrom the course or rescinding the degree. Students should make themselvesfamiliar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic IntegritySection in your Unit Description. MN603 Wireless Networks and Security Page#2 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha November, 2020Assignment DescriptionPart AMobile Ad Hoc network (MANET) is a collection of mobile devices which form a communicationnetwork. There are multiple type of routing protocols designed for MANETs such as Ad Hoc OnDemand Distance Vector (AODV), Destination-Sequenced Distance-Vector (DSDV), Dynamic SourceRouting (DSR) and Ad Hoc On-Demand Multipath Distance (AOMDV).Students are required to submit a report including technical details on Dynamic Source Routing (DSR)and Ad Hoc On-Demand Multipath Distance (AOMDV) protocols. Report must include details on• Routing mechanism• Advantages and limitations of using these protocols in WSNsPart BWireless networks performance varies from wired networks, the latter uses a guided medium andwireless networks use unguided medium for transmission. To design and simulate wirelessnetworks the network simulator – 2 (NS – 2), an open source discreet event simulator could be used.The NS-2 simulator is a widely used simulation tool, which could generate trace files for analysisand comes with a network animator to visualize the network performance.This assessment requires students to compare and evaluate the performance of wireless routingprotocol using the NS-2. The assessment requires students to design a wireless network topology inNS-2 and evaluate the generated trace files for a wireless routing protocol. The students arerequired to carry out a critical analysis of the results of the protocol, by plotting graphs anddiscussing the outcomes.The students are required to:Design a wireless network consisting of 15 nodes; the dimensions for the given topology are250×250. The agent type should be UDP and the traffic CBR. The simulation should run for 300seconds. Random deployment of nodes is required and the nodes are required to transmit packetsover the network. The wireless node configuration should include the NS-2 energy model.Run the simulation on routing protocol DSR or AOMDV. Critically analyse the trace files in terms ofpackets sent, received and dropped. These parameters should be plotted on graphs and discussedin detail.Include screenshots of the NAM displaying the nodes deployed during the simulation and addscreen shots of the simulation.Appendix I should include the tcl srcript used in each simulation.MN603 Wireless Networks and Security Page#3 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha November, 2020Marking criteria: Section to be included inthe reportDescription of the sectionMarksPart A30IntroductionDefine the topic and outline of the report ( in 5-6sentences)5MotivationYou need to motivate the reader about the topic5Routing protocolsanalysisTechnical discussion on routing mechanism1. DSR2. AOMDV10+10=20Part B70Feedback incorporationfrom Part A10Part B- IntroductionOutline of the report ( in 3-4 sentences)4Report LayoutReport layout, style and language5Network DesignThe network topology shown in the NAM5SimulationSimulation screen shots for routing protocol at 100s,150s and 250s simulation time with description of theongoing events.12Trace file analysisProvide a critical analysis of the two trace files in terms ofpackets sent, received, dropped8ResultsPlot the graphs for packets sent, received, dropped forthe protocol.8ConclusionWrite summary of the report4Reference styleFollow IEEE reference style4Appendix 1The tcl files for the routing protocol10 MN603 Wireless Networks and Security Page#4 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha November, 2020Marking Rubric for Assignment #1: Total Marks 100 GradeMarkHD(80-100)%DI(70-79)%CR(60-69)%P(50-59)%Fail


Leave a Reply

Your email address will not be published. Required fields are marked *