Wireless Networks and Security | My Assignment Tutor

Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Wanod Kumar April, 2021 Assessment Details and Submission GuidelinesTrimesterT1 2021Unit CodeMN603Unit TitleWireless Networks and SecurityAssessmentTypeAssignment 2 (Group assignment, 4-5 members per group)AssessmentTitleImplementation of Wireless networks and performance evaluationPurpose of theassessment(with ULOMapping)The purpose of the assignment is to implement wireless networks in Simulationenvironment and analyse the routing protocols, evaluate them in terms ofsecurity, QoS, and energy efficiency. Students will be able to complete thefollowing ULOs:a. Analyse and compare wireless communication protocols;b. Apply and evaluate wireless network security techniques withconsideration of ethical implications;c. Design and implement secure enterprise wireless networksWeight30%Total Marks100Word limit2500-3000Due Date4th June 2021 11:55pmSubmissionGuidelines All work must be submitted on Moodle by the due date along with acompleted Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)font and 2 cm margins on all four sides of your page with appropriate sectionheadings. Reference sources must be cited in the text of the report, and listedappropriately at the end in a reference list using IEEE referencing style.Extension If an extension of time to submit work is required, a Special ConsiderationApplication must be submitted directly on AMS. You must submit thisapplication three working days prior to the due date of the assignment.Further information is available at:https://www.mit.edu.au/about-us/governance/institute-rules-policies-andplans/policies-procedures-and-guidelines/assessment-policyAcademicMisconduct Academic Misconduct is a serious offence. Depending on the seriousness ofthe case, penalties can vary from a written warning or zero marks to exclusionfrom the course or rescinding the degree. Students should make themselvesfamiliar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic IntegritySection in your Unit Description. MN603 Wireless Networks and Security Page#2 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Wanod Kumar April, 2021Assignment DescriptionTask 1Wireless networks performance varies from wired networks, the latter uses a guided medium andwireless networks use unguided medium for transmission. To design and simulate wireless networksthe network simulator – 2 (NS – 2), an open source discreet event simulator could be used. The NS-2simulator is a widely used simulation tool, which could generate trace files for analysis and comeswith a network animator to visualize the network performance.This assessment requires students to compare and evaluate the performance of wireless routingprotocol using the NS – 2. The assessment requires students to design a wireless network topology inNS – 2 and evaluate the generated trace files for a wireless routing protocol. The students are requiredto carry out a critical analysis of the results of the protocol by plotting graphs and discussing theoutcomes.The students are required work in a group (4 to 5 students) and report on followings Design a wireless network consisting of 15 nodes; the dimensions for the given topology are500×500. The agent type should be User Datagram Protocol (UDP) and the traffic Constant BitRate (CBR). The simulation should run for 100 seconds. Random deployment of nodes isrequired and the nodes are required to transmit packets over the network. The wireless nodeconfiguration should include the NS – 2 energy model. Run the simulation on routing protocol Destination Sequenced Distance Vector Routing(DSDV). Critically analyse the trace files in terms of packets sent, received and dropped. Theseparameters should be plotted on graphs and discussed in detail.Include screenshots of the NAM (Network Animator) displaying the nodes deployed duringthe simulation and add screen shots of the simulation.Conduct analysis on the results for packets sent, received and dropped for the protocol.Appendix I should include the tcl srcript used in each simulation. Task 2Smart home or home automation technology provides homeowners’ security, comfort, convenienceand energy efficiency by enabling them to control smart devices, via an app on their smartphone orother networked device. This technology enables you doing things such as turn the lights on/off,stream music to a speaker, lock/open the doors remotely, and much more.This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco PacketTracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to beused in the home. Those IoT devices will be connected to the home WLAN that enables the users tocontrol the things through wireless technology. The users should also be able to control the thingswhen they are outside home (remote access). This means the WLAN should be connected to a globalnetwork that enables the users to have control on devices when they are at work.The students are required to complete the following steps: Explore the ethical implications in the design and implementation of Wireless Local AreaNetworks (WLANs).Test and prove a successful connectivity between users and IoT devices when they are at home and when they are outside of home. You need to take a snapshot for each step oftesting followed by the explanation.MN603 Wireless Networks and Security Page#3 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Wanod Kumar April, 2021Marking Guide Section to be included in thereportDescription of the sectionMarksIntroductionOutline of the report5Report LayoutReport layout, style andlanguage5NS – 2 Simulation and networkdesignSimulation screen shots forrouting protocol at 100ssimulation time withdescription of the ongoingevents for DSDV20NS – 2 Trace file analysisProvide a critical analysis ofthe trace file in terms ofpackets sent, received,dropped10NS – 2 Simulation ResultsAnalysisPlot and conduct analysis onthe graphs for packets sent,received, dropped for theprotocol.20Explore ethicalimplicationsInvestigate and report theethical implications in thedesign and implementation ofa secure wireless LAN10Design, analysis, andimplementation of smarthomeDesign, Analysis, andimplementation of a smarthome using WLAN10TestingTest and prove a successful ofconnectivity between usersand IoT devices when they areat home and when they are atwork. You need to take asnapshot for each step oftesting followed by theexplanation.10ConclusionWrite summary of the reporthighlighting the positive andnegative points5Reference styleFollow IEEE reference styleand format5 MN603 Wireless Networks and Security Page#4 of 4Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Wanod Kumar April, 2021Marking Rubric for Assignment #1: Total Marks 100 GradeMarkHD80-100DI70-79CR60-69P50-59Fail


Leave a Reply

Your email address will not be published. Required fields are marked *