MN603 Wireless Networks and Security Assignment help for Melbourne Institute

The MN603 Wireless Networks and Security course is offered by Melbourne University and is an important course for any student who is interested in pursuing a career in network security. This course helps in providing the skills and the knowledge to the students regarding assessing and securing the wireless network effectively. The component of the practical assessment of the course is specifically in demand as it provides hands-on experience to the students in assessing as well as securing the real work wireless networks. By taking this MN603 course, the students can get help in making sure about the reliability and security of the wireless networks. This assessment needs the students to compare the technologies of communication which can be used with the IOT-enabled devices. This course covers the topics such as Wireless LAN security, wireless network design, wireless network management, and wireless intrusion detection and prevention.

We know that it is not impossible to complete but still, there are lots of problems the students are facing and that is they are having the lack of time as they are doing part-time jobs along with enrolling in the universities due to which they are not able to complete their assignments within deadline with accuracy. Therefore, we are here to help the students in solving their problems by helping them in improving their grades as well as helping in providing the best quality MN603 assignment help at an affordable price. If you will take help from our company for your MN603 Assignment help then we surely guarantee you that you will get the best quality content, timely delivery, 24-hour support, 100 % plagiarism-free content with proof of plag report and help from our experienced experts. In our company, we have experienced experts who have the knowledge and the skills related to the subjects.

Hence, if you want to take help in your MN603 Wireless Networks and Security Assignment, then you can contact us freely at any time.

Assessment Details and Submission Guidelines

Trimester

T2 2023

Unit Code

MN603

Unit Title

Wireless Network and Security

Assessment  

Type

Assessment 1 Individual -Formative

Assessment  

Title

Wireless Communication Protocols: A Comparative Analysis and Evaluation

Purpose of the  assessment  

(with ULO  Mapping)

This assignment assesses the following Unit Learning Outcomes; students should  be able to demonstrate their achievements in them.

 a. Analyse and compare wireless communication protocols;

Weight

10%

Total Marks

20

Word limit

Max 1000 words

Due Date

Week 3, 6/08/2023

Submission  

Guidelines

Submit Assignment 1a in a word document in week 3  

All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.  

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font, and 2 cm margins on all four sides of your page with appropriate section  headings.  

Reference sources must be cited in the text of the report, and listed  appropriately at the end in a reference list using IEEE referencing style.

Extension

If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:  

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Academic  

Misconduct

Academic Misconduct is a serious offence. Depending on the seriousness of  the case, penalties can vary from a written warning or zero marks to exclusion  from the course or rescinding the degree. Students should make themselves  familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies

procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy Procedure. For further information, please refer to the Academic Integrity  Section in your Unit Description.

Assignment Description

The objective of this assignment is to conduct a comprehensive analysis and comparison of various  wireless communication protocols. Your task is to write a report focusing on two selected wireless  communication protocols from the following list:

802.11ax Protocol (Wi-Fi 6)  

802.11ac Protocol (Wi-Fi 5)

Wi-Fi (802.11x standards)

ZigBee

WiMax

Z-Wave

NFC

6LoWPAN

Bluetooth

RFID

WLAN

IoT

5G

Your report should thoroughly cover the following points for each chosen protocol:

1. Introduction to the selected technologies

Introduce the importance of wireless communication protocols in modern society. Explain the significance of wireless protocols in enabling seamless connectivity and  data transfer.

2. Use case example(s) of the selected technologies.

Select a minimum of two wireless communication protocols for analysis.  Recommended protocols include Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC,  LTE, 5G, and others.

Justify your selection, highlighting the relevance and prevalence of each protocol in  today’s technology landscape.

Investigate the real-world applications of each wireless communication protocol in  various industries and consumer products.

Analyse how each protocol caters to specific use cases and how it addresses the  challenges in those domains.

3. Technical backgrounds on the selected technologies

Explore the technical specifications of each selected protocol, such as data transfer  rates, frequency bands used, range, and compatibility with different devices. Compare and contrast these technical aspects to understand the unique capabilities  of each protocol.

4. Compare and contrast the two wireless communication protocols you have chosen,  highlighting the similarities and differences between them.

Analyse the performance metrics of each protocol, including throughput, latency, and  power consumption.

Compare the efficiency of these protocols in handling different types of data and  multimedia content.

5. Security vulnerabilities and resolutions of the selected technologies

Evaluate the security features implemented in each protocol to safeguard data  integrity and user privacy.

Examine the vulnerabilities and potential threats associated with each protocol.

Marking Criteria:

Section to be included in  the report

Description

Mar

ks

Section1: introduction and  case examples

Introduce the importance of wireless communication  protocols in modern society.

Explain the significance of wireless protocols in enabling  seamless connectivity and data transfer.

Select a minimum of two wireless communication  protocols for analysis. Recommended protocols include  Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC, LTE,  5G, and others.

Justify your selection, highlighting the relevance and  prevalence of each protocol in today’s technology  landscape.

Investigate the real-world applications of each wireless  communication protocol in various industries and  consumer products.

Analyse how each protocol caters to specific use cases  and how it addresses the challenges in those domains.

4

Section 2: Technical  

backgrounds and Potential  benefits

Describe how the selected wireless technologies operate  – in particular for the aforementioned business  

environment (and their potential benefits)

Explore the technical specifications of each selected  protocol, such as data transfer rates, frequency bands  used, range, and compatibility with different devices.

Compare and contrast these technical aspects to  understand the unique capabilities of each protocol

5

Section 3: Comparison

Compare and contrast the two wireless communication  protocols you have chosen, highlighting the similarities  and differences between them.

Analyse the performance metrics of each protocol,  including throughput, latency, and power consumption. Compare the efficiency of these protocols in handling  different types of data and multimedia content.

5

Section 4: Security  

vulnerabilities and  

resolutions

Describe the known and unknown security vulnerabilities and  your recommended resolutions. If available, some evidence  of security testing

4

Report structure

Inadequate structure, careless presentation, poor writing, word limits. Presents and analyses facts and evidence that  are relevant to the topic. All sources used should be  acknowledged and referenced throughout.

1

Reference style (IEEE)

Minimum 5 Proper different referencing resources

1

Total

20

Marking Rubric for Exercise Answers

Grade

Mark

HD

80%+

D

70%-79%

CR

60%-69%

P

50%-59%

Fail

< 50%

Excellent

Very Good

Good

Satisfactory

Unsatisfactory

Section 1-

introduction  and case  

example /4

Explanation is  clear and easy  to follow with  strong  

argument

Consistency  

logical and  

convincing

Consistency  

logical and  

convincing

Adequate  

cohesion and  

conviction

Argument is  confused  

and  

disjointed

Section 2 –

Technical  

backgrounds  and Potential  benefits /5

The presented  solution  

demonstrated  an extreme  

degree of  

details on  

wireless  

technology  

operations.

The presented  solution  

demonstrated  a high degree  of details on  

wireless  

technology  

operations.

The presented  solution  

demonstrate d  an average  

degree of  

details on  

wireless  

technology  

operations.

The presented  solution  

demonstrated a  low degree of  details on  

wireless  

technology  

operations

The  

presented  

solution  

demonstrate d a poor  

degree of  

details on  

wireless  

technology  

operations.

Section 3:  

Comparison /5

Provides a  

clear and  

concise  

comparison of  the two  

wireless  

communicatio n protocols  

chosen,  

highlighting  

their  

similarities and  differences.

Provides a  

comparison of  the two  

wireless  

communicatio n protocols  

chosen, but  

with some  

minor errors  

or omissions.

Provides a  

limited  

comparison of  the two  

wireless  

communicatio n protocols  

chosen, with  significant  

errors or  

omissions.

Comparison is  inadequate.

Comparison  is missing.

Section 4 –

Security  

vulnerabilitie s s and  

resolutions  

/4

The presented  solution  

demonstrated  an extreme  

degree of  

details on  

wireless  

technology  

security  

concerns.

The presented  solution  

demonstrated  a high degree  of details on  

wireless  

technology  

security  

concerns.

The presented  solution  

demonstrate d  an average  

degree of  

details.

The presented  solution  

demonstrated a  low of details  

on wireless  

technology  

security  

concerns.

The  

presented  

solution  

demonstrate d a poor  

degree of  

details on  

wireless  

technology  

security  

concerns.

Report  

structure /1

Proper writing.  Professionally  

presented

Properly spoken,  with some minor  deficiencies

Mostly good, but  some structure  or presentation  problems

Acceptable  

presentation

Poor  

structure,  

careless  

presentation

Reference  

style (IEEE)  /1

Clear styles  

with excellent  source of  

references.

excellent  

source of  

references.  

Clear  

referencing/  

style

Generally  

good  

referencing/  

style

Unclear  

referencing/styl e

Lacks  

consistency  with many  

errors