Wireless Networks and Security (MN603) Assignment Help
Assessment Details and Submission Guidelines |
|
Trimester |
T1 2024 |
Unit Code |
MN603 |
Unit Title |
|
Assessment Type |
Assignment 2 (Group assignment, 3-4 members per group) |
Assessment Title |
Implementation of Wireless networks and performance evaluation |
Purpose of the assessment (with ULO Mapping) |
The purpose of the assignment is to compare NS3 simulator with other current network simulators. Developed, modify and study wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission. Students will be able to complete the following ULOs: • Analyse and compare wireless communication protocols. • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance. |
Weight |
20% |
Total Marks |
100 |
Word limit |
2000-3000 |
Due Date |
Week 11; 30/05/2024 |
Submission Guidelines |
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style. |
Extension |
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy |
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis of different existing network simulation software tools.
Task 2. Involving analysis and modification of current the NS3 lab exercises code.
Q1. Pick any two of the following network simulators, explore and analyze each network simulator and write a short comparative study report of them including NS3 simulator. • OPNET
• OMNet++
• NetSim
• Mininet
• QualNet
Q2. Write a Multihop Adhoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Use number of node 6 and Step 30 Meter in your program. Also give name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization the performance of your Multihop Adhoc program. Take a screen shot of the created .xml file in NetAnim display. Screen shot of 6 packet captured files. Attach the code of your program in the submission report.
Q3. Case Study:
ABC Hospital is seeking to implement a wireless solution for monitoring and receiving data from patients residing within a 3km radius. The goal is to leverage Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure patient data transmission.
a) Design a wireless solution for supporting the above application using Wireless Local Area Network (WLAN) technology. Design should include the conceptual WLAN architecture based on IEEE 802.11 where a hospital can monitor and receive data from patients living within a 3km radius. Explain and justify your answer with an appropriate diagram.
b) Identify and explain a particular security attack that could breach patients’ personal data. c) What prevention technique would you adopt to mitigate the effect of your choice of attack?
Marking Guide
Section to be included in the report |
Description of the section |
Marks |
Task-1: Comparative study of selected two Network simulators with NS3 simulator. |
Detail Comparative study report of three Network simulators (two selected choice and NS3). Including features, advantages, and disadvantages. Each simulator description in the study will be 5 marks each. |
5+5+5=15 |
Task-2: NS3 Simulation |
Correctly written the Multihop Adhoc wireless networks program using number of node 6 and step 30 M. Provided codes. |
8 |
Appropriately created .xml file. And generated 6 packets captured files. Provided Valid Screen shots. |
7 |
|
Task-3: Case Study |
||
Introduction |
3 |
|
Design and implementation of a secure wireless LAN |
6 |
|
Identify and explain a particular security attack. |
4 |
|
Prevention and mitigation techniques of your choice of attack. |
4 |
|
Conclusion |
Write a summary of the report highlighting the positive and negative points. |
3 |
Reference style |
Follow the IEEE reference style. Reference should be cited in the body of the report. |
2 |
Format of the report |
Report Layout and Format. Format must be looks professional. |
3 |
Grade Mark |
HD 80-100 |
D 70-79 |
CR 60-69 |
P 50-59 |
Fail <50 |
Excellent |
Very Good |
Good |
Satisfactory |
Unsatisfactory |
|
Task 1 |
|||||
Written comparative study report on three network simulators including NS3. /15 |
Two simulators have sleeted from the list. Explored, studied, and compared their features with NS3 simulator and written report in the form of table. Advantages and disadvantages are heighted. |
Selection of simulators are relevant and soundly analysed and written comparative study report. |
Selection of simulators are generally relevant and comparative study reported. |
Selection of simulators have some relevance comparative study reported but not up to the standar. |
No relevance of the selection of the simulator and the report is poorly written |
Task 2 NS3 Simulation |
Correctly written the Multihop Adhoc wireless networks program using number of node 6 and step 30 M. Provided codes. |
Very good. Written the Multihop Adhoc wireless networks program using number of node 6 and step 30 M. Provided codes |
Good in writing the Multihop Adhoc wireless networks program. Used number of node 6 number of nodes used step 30 M. Provided codes |
Satisfactorily writing the Multihop Adhoc wireless networks program. Used number of node 6 number of nodes used step 30 M. Provided codes but hard to find the location where nodes number are included. |
Poorly or not attempt writing the code. |
Appropriately created .xml file. And generated 6 packets captured files. Provided Valid Screen shots. |
Created .xml file. And generated packets captured files. Provided relevant screen shots. |
Properly named the .xml file. And generated packets captured files. Provided relevant visible screen shots |
Satisfactorily named the .xml file. And generated packets captured files. Relevant screen shots are not clearly visible |
Poor screenshots. Hard to find the .xml File. No output of the screen shots. |
|
Task 2 Case study |
|||||
Introduction/3 |
All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated |
Topics are relevant and soundly analysed. |
Generally relevant and analysed. |
Some relevance and briefly presented. |
This is not relevant to the assignment topic. |
Design and implementation of a secure wireless LAN/6 |
Demonstrated excellent ability to think critically and present an exceptional design considering all the requirements |
Demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s |
Demonstrate d good ability to think critically and present a good design considering all the requirements. |
Demonstrated ability to think critically and present a design |
Did not demonstrate ability to think critically and present a design. |
Identify and explain a particular security attack. /4 |
Excellently identified appropriate cyber attacks and well explained the attacks. |
Very good in identificatio n of attacks and appropriatel y explained the attack scenario. |
Good understanding of identification and explanation on attacks. |
Fair identifications and explanation on attacks. |
Unable to identify and explain the attacks. |
Prevention and mitigation techniques of your choice of attack. /4 |
Excellent strategy of prevention and mitigation techniques of the attacks. |
Very good of your prosed strategy of prevention and mitigation techniques of the attacks. |
Good strategy of prevention and mitigation techniques of the attacks. |
Fair strategy of your prosed prevention and mitigation methods of the attacks. |
Not relevancy of your prosed prevention and mitigation methods of the attacks. |
Conclusion/3 |
Excellent summary of the report highlighting all the positive and negative points |
Very good summary of the report highlighting most of the positive and negative points |
Good summary of the report highlighting significant number of the positive and negative points. |
Fair summary of the report highlighting a few numbers of the positive and negative points. |
Poor summary of the report. Failed to be highlighting positive and negative points. |
Reference style/2 |
Clear styles with excellent source of references. Cited well in the body of the report. |
Clear referencing style and cited in the body of the report. |
Generally good referencing style |
Sometimes clear referencing style |
Lacks consistency with many errors |
Format and the report Layout. /3 |
Exceptional report layout, style and language used |
Very good report layout, style and language used |
Good report layout, style and language used |
Acceptable report layout, style and language used |
Poor report layout, style and language used |
Leave A Comment