Wireless Networks and Security (MN603) Assignment Help
Click Here For The Solution
|
Assessment Details and Submission Guidelines
|
|
Trimester
|
T1 2024
|
|
Unit Code
|
MN603
|
|
Unit Title
|
Wireless Networks and Security
|
|
Assessment
Type
|
Assignment 2 (Group assignment, 3-4 members per group)
|
|
Assessment
Title
|
Implementation of Wireless networks and performance evaluation
|
|
Purpose of the assessment
(with ULO Mapping)
|
The purpose of the assignment is to compare NS3 simulator with other current network simulators. Developed, modify and study wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission.
Students will be able to complete the following ULOs:
• Analyse and compare wireless communication protocols. • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance.
|
|
Weight
|
20%
|
|
Total Marks
|
100
|
|
Word limit
|
2000-3000
|
|
Due Date
|
Week 11; 30/05/2024
|
|
Submission
Guidelines
|
• All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
• Reference sources must be cited in the text of the report and listed appropriately at the end in a reference list using IEEE referencing style.
|
|
Extension
|
• If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:
https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy
|
Assignment Description
This assignment consists of three tasks.
Task 1 Study and analysis of different existing network simulation software tools.
Task 2. Involving analysis and modification of current the NS3 lab exercises code.
Q1. Pick any two of the following network simulators, explore and analyze each network simulator and write a short comparative study report of them including NS3 simulator. • OPNET
• OMNet++
• NetSim
• Mininet
• QualNet
Q2. Write a Multihop Adhoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Use number of node 6 and Step 30 Meter in your program. Also give name of the xml file as “Your Group name.xml.” Execute the program and execute NetAnim for visualization the performance of your Multihop Adhoc program. Take a screen shot of the created .xml file in NetAnim display. Screen shot of 6 packet captured files. Attach the code of your program in the submission report.
Q3. Case Study:
ABC Hospital is seeking to implement a wireless solution for monitoring and receiving data from patients residing within a 3km radius. The goal is to leverage Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure patient data transmission.
a) Design a wireless solution for supporting the above application using Wireless Local Area Network (WLAN) technology. Design should include the conceptual WLAN architecture based on IEEE 802.11 where a hospital can monitor and receive data from patients living within a 3km radius. Explain and justify your answer with an appropriate diagram.
b) Identify and explain a particular security attack that could breach patients’ personal data. c) What prevention technique would you adopt to mitigate the effect of your choice of attack?
Marking Guide
|
Section to be included in the report
|
Description of the section
|
Marks
|
|
Task-1: Comparative study of selected two Network
simulators with NS3
simulator.
|
Detail Comparative study report of three Network simulators (two selected choice and NS3). Including features, advantages, and disadvantages. Each simulator description in the study will be 5 marks each.
|
5+5+5=15
|
|
Task-2: NS3 Simulation
|
Correctly written the Multihop Adhoc wireless networks program using number of node 6 and step 30 M. Provided codes.
|
8
|
|
Appropriately created .xml file. And generated 6 packets captured files. Provided Valid Screen shots.
|
7
|
|
Task-3: Case Study
|
|
|
|
Introduction
|
3
|
|
Design and implementation of a secure wireless LAN
|
6
|
|
Identify and explain a particular security attack.
|
4
|
|
Prevention and mitigation techniques of your choice of attack.
|
4
|
|
Conclusion
|
Write a summary of the report highlighting the positive and negative points.
|
3
|
|
Reference style
|
Follow the IEEE reference style. Reference should be cited in the body of the report.
|
2
|
|
Format of the report
|
Report Layout and Format. Format must be looks professional.
|
3
|
|
Grade
Mark
|
HD
80-100
|
D
70-79
|
CR
60-69
|
P
50-59
|
Fail
<50
|
|
Excellent
|
Very Good
|
Good
|
Satisfactory
|
Unsatisfactory
|
|
Task 1
|
|
|
|
|
|
|
Written
comparative
study report on three network simulators
including NS3. /15
|
Two simulators
have sleeted from the list. Explored, studied, and
compared their
features with NS3 simulator and
written report in the form of table. Advantages and
disadvantages are heighted.
|
Selection of simulators
are relevant and soundly analysed
and written comparative study report.
|
Selection of
simulators are generally
relevant and
comparative
study reported.
|
Selection of
simulators have some relevance comparative
study reported but not up to
the standar.
|
No relevance of the selection of the simulator
and the report is poorly written
|
|
Task 2
NS3 Simulation
|
Correctly written the Multihop Adhoc wireless networks program using number of node 6 and step 30 M. Provided codes.
|
Very good.
Written the Multihop
Adhoc
wireless
networks
program
using
number of
node 6 and
step 30 M.
Provided
codes
|
Good in writing the Multihop
Adhoc wireless networks
program. Used number of node 6 number of
nodes used
step 30 M.
Provided codes
|
Satisfactorily
writing the
Multihop Adhoc wireless
networks
program. Used
number of node 6 number of
nodes used step 30 M. Provided codes but hard to find the
location where nodes number are included.
|
Poorly or not
attempt writing the code.
|
|
Appropriately
created .xml file. And generated 6 packets captured files. Provided Valid Screen shots.
|
Created .xml file. And generated
packets
captured
files.
Provided
relevant
screen shots.
|
Properly named the
.xml file. And
generated
packets
captured files. Provided
relevant visible screen shots
|
Satisfactorily
named the
.xml file. And
generated
packets
captured files. Relevant screen shots are not
clearly visible
|
Poor
screenshots.
Hard to find the .xml
File. No output of the screen
shots.
|
|
Task 2
Case study
|
|
|
|
|
|
|
Introduction/3
|
All topics are
pertinent and
covered in depth. Ability to think
critically and source material is
demonstrated
|
Topics are
relevant and soundly
analysed.
|
Generally
relevant and
analysed.
|
Some relevance and briefly
presented.
|
This is not
relevant to the assignment
topic.
|
|
Design and
implementation of a secure
wireless LAN/6
|
Demonstrated
excellent ability to think critically and present an
exceptional design considering all the requirements
|
Demonstrat
ed good
ability to
think
critically and present an
exceptional design
considering all the
requirement s
|
Demonstrate d good ability to think critically and present a good design
considering all the
requirements.
|
Demonstrated ability to think critically and
present a design
|
Did not
demonstrate
ability to think
critically and
present a
design.
|
|
Identify and
explain a
particular
security attack. /4
|
Excellently
identified
appropriate cyber attacks and well
explained the
attacks.
|
Very good in identificatio
n of attacks and
appropriatel y explained the attack
scenario.
|
Good
understanding of identification and explanation on attacks.
|
Fair
identifications
and explanation on attacks.
|
Unable to
identify and
explain the
attacks.
|
|
Prevention and mitigation
techniques of
your choice of attack. /4
|
Excellent strategy of prevention and mitigation
techniques of the attacks.
|
Very good of your prosed strategy of
prevention
and
mitigation
techniques
of the
attacks.
|
Good strategy of prevention
and mitigation techniques of
the attacks.
|
Fair strategy of your prosed
prevention and mitigation
methods of the attacks.
|
Not relevancy of your prosed
prevention and mitigation
methods of the attacks.
|
|
Conclusion/3
|
Excellent summary of the report
highlighting all the positive and
negative points
|
Very good
summary of the report
highlighting most of the positive and negative
points
|
Good
summary of the report
highlighting
significant
number of the positive and
negative points.
|
Fair summary of the report
highlighting a
few numbers of the positive and negative points.
|
Poor summary of the report.
Failed to be
highlighting
positive and
negative points.
|
|
Reference
style/2
|
Clear styles with
excellent source of references. Cited well in the body of the report.
|
Clear
referencing
style and
cited in the
body of the report.
|
Generally good referencing
style
|
Sometimes clear referencing style
|
Lacks
consistency
with many
errors
|
|
Format and the report Layout.
/3
|
Exceptional report layout, style and
language used
|
Very good
report
layout, style and
language
used
|
Good report
layout, style
and language
used
|
Acceptable
report layout,
style and
language used
|
Poor report
layout, style and language used
|
Leave A Comment