MN603 Wireless Networks and Security Assignment help for Melbourne Institute
The MN603 Wireless Networks and Security course is offered by Melbourne University and is an important course for any student who is interested in pursuing a career in network security. This course helps in providing the skills and the knowledge to the students regarding assessing and securing the wireless network effectively. The component of the practical assessment of the course is specifically in demand as it provides hands-on experience to the students in assessing as well as securing the real work wireless networks. By taking this MN603 course, the students can get help in making sure about the reliability and security of the wireless networks. This assessment needs the students to compare the technologies of communication which can be used with the IOT-enabled devices. This course covers the topics such as Wireless LAN security, wireless network design, wireless network management, and wireless intrusion detection and prevention.
We know that it is not impossible to complete but still, there are lots of problems the students are facing and that is they are having the lack of time as they are doing part-time jobs along with enrolling in the universities due to which they are not able to complete their assignments within deadline with accuracy. Therefore, we are here to help the students in solving their problems by helping them in improving their grades as well as helping in providing the best quality MN603 assignment help at an affordable price. If you will take help from our company for your MN603 Assignment help then we surely guarantee you that you will get the best quality content, timely delivery, 24-hour support, 100 % plagiarism-free content with proof of plag report and help from our experienced experts. In our company, we have experienced experts who have the knowledge and the skills related to the subjects.
Hence, if you want to take help in your MN603 Wireless Networks and Security Assignment, then you can contact us freely at any time.
Assessment Details and Submission Guidelines |
|
Trimester |
T2 2023 |
Unit Code |
MN603 |
Unit Title |
Wireless Network and Security |
Assessment Type |
Assessment 1 Individual -Formative |
Assessment Title |
Wireless Communication Protocols: A Comparative Analysis and Evaluation |
Purpose of the assessment (with ULO Mapping) |
This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them. a. Analyse and compare wireless communication protocols; |
Weight |
10% |
Total Marks |
20 |
Word limit |
Max 1000 words |
Due Date |
Week 3, 6/08/2023 |
Submission Guidelines |
• Submit Assignment 1a in a word document in week 3 • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font, and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension |
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy |
Academic Misconduct |
• Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. |
Assignment Description
The objective of this assignment is to conduct a comprehensive analysis and comparison of various wireless communication protocols. Your task is to write a report focusing on two selected wireless communication protocols from the following list:
• 802.11ax Protocol (Wi-Fi 6)
• 802.11ac Protocol (Wi-Fi 5)
• Wi-Fi (802.11x standards)
• ZigBee
• WiMax
• Z-Wave
• NFC
• 6LoWPAN
• Bluetooth
• RFID
• WLAN
• IoT
• 5G
Your report should thoroughly cover the following points for each chosen protocol:
1. Introduction to the selected technologies
• Introduce the importance of wireless communication protocols in modern society. • Explain the significance of wireless protocols in enabling seamless connectivity and data transfer.
2. Use case example(s) of the selected technologies.
• Select a minimum of two wireless communication protocols for analysis. Recommended protocols include Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC, LTE, 5G, and others.
• Justify your selection, highlighting the relevance and prevalence of each protocol in today’s technology landscape.
• Investigate the real-world applications of each wireless communication protocol in various industries and consumer products.
• Analyse how each protocol caters to specific use cases and how it addresses the challenges in those domains.
3. Technical backgrounds on the selected technologies
• Explore the technical specifications of each selected protocol, such as data transfer rates, frequency bands used, range, and compatibility with different devices. • Compare and contrast these technical aspects to understand the unique capabilities of each protocol.
4. Compare and contrast the two wireless communication protocols you have chosen, highlighting the similarities and differences between them.
• Analyse the performance metrics of each protocol, including throughput, latency, and power consumption.
• Compare the efficiency of these protocols in handling different types of data and multimedia content.
5. Security vulnerabilities and resolutions of the selected technologies
• Evaluate the security features implemented in each protocol to safeguard data integrity and user privacy.
• Examine the vulnerabilities and potential threats associated with each protocol.
Marking Criteria:
Section to be included in the report |
Description |
Mar ks |
Section1: introduction and case examples |
• Introduce the importance of wireless communication protocols in modern society. • Explain the significance of wireless protocols in enabling seamless connectivity and data transfer. • Select a minimum of two wireless communication protocols for analysis. Recommended protocols include Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC, LTE, 5G, and others. • Justify your selection, highlighting the relevance and prevalence of each protocol in today’s technology landscape. • Investigate the real-world applications of each wireless communication protocol in various industries and consumer products. • Analyse how each protocol caters to specific use cases and how it addresses the challenges in those domains. |
4 |
Section 2: Technical backgrounds and Potential benefits |
• Describe how the selected wireless technologies operate – in particular for the aforementioned business environment (and their potential benefits) • Explore the technical specifications of each selected protocol, such as data transfer rates, frequency bands used, range, and compatibility with different devices. • Compare and contrast these technical aspects to understand the unique capabilities of each protocol |
5 |
Section 3: Comparison |
• Compare and contrast the two wireless communication protocols you have chosen, highlighting the similarities and differences between them. • Analyse the performance metrics of each protocol, including throughput, latency, and power consumption. • Compare the efficiency of these protocols in handling different types of data and multimedia content. |
5 |
Section 4: Security vulnerabilities and resolutions |
Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing |
4 |
Report structure |
Inadequate structure, careless presentation, poor writing, word limits. Presents and analyses facts and evidence that are relevant to the topic. All sources used should be acknowledged and referenced throughout. |
1 |
Reference style (IEEE) |
Minimum 5 Proper different referencing resources |
1 |
|
Total |
20 |
Marking Rubric for Exercise Answers
Grade Mark |
HD 80%+ |
D 70%-79% |
CR 60%-69% |
P 50%-59% |
Fail < 50% |
|
Excellent |
Very Good |
Good |
Satisfactory |
Unsatisfactory |
Section 1- introduction and case example /4 |
Explanation is clear and easy to follow with strong argument |
Consistency logical and convincing |
Consistency logical and convincing |
Adequate cohesion and conviction |
Argument is confused and disjointed |
Section 2 – Technical backgrounds and Potential benefits /5 |
The presented solution demonstrated an extreme degree of details on wireless technology operations. |
The presented solution demonstrated a high degree of details on wireless technology operations. |
The presented solution demonstrate d an average degree of details on wireless technology operations. |
The presented solution demonstrated a low degree of details on wireless technology operations |
The presented solution demonstrate d a poor degree of details on wireless technology operations. |
Section 3: Comparison /5 |
Provides a clear and concise comparison of the two wireless communicatio n protocols chosen, highlighting their similarities and differences. |
Provides a comparison of the two wireless communicatio n protocols chosen, but with some minor errors or omissions. |
Provides a limited comparison of the two wireless communicatio n protocols chosen, with significant errors or omissions. |
Comparison is inadequate. |
Comparison is missing. |
Section 4 – Security vulnerabilitie s s and resolutions /4 |
The presented solution demonstrated an extreme degree of details on wireless technology security concerns. |
The presented solution demonstrated a high degree of details on wireless technology security concerns. |
The presented solution demonstrate d an average degree of details. |
The presented solution demonstrated a low of details on wireless technology security concerns. |
The presented solution demonstrate d a poor degree of details on wireless technology security concerns. |
Report structure /1 |
Proper writing. Professionally presented |
Properly spoken, with some minor deficiencies |
Mostly good, but some structure or presentation problems |
Acceptable presentation |
Poor structure, careless presentation |
Reference style (IEEE) /1 |
Clear styles with excellent source of references. |
excellent source of references. Clear referencing/ style |
Generally good referencing/ style |
Unclear referencing/styl e |
Lacks consistency with many errors |