MN603 T2 2023 Assignment Help
Trimester | T2 2023 |
Unit Code | MN603 |
Unit Title | Wireless Networks and Security |
Assessment Type | Assignment 2 (Group assignment, 4 members per group) |
Assessment Title | Implementation of Wireless networks and performance evaluation |
Purpose of the assessment (with ULO Mapping) | The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs:
|
Weight | 20% |
Total Marks | 100 |
Word limit | 2000-3000 |
Due Date | Week 11; 28/9/2023 |
Submission Guidelines |
|
Extension | If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: |
Academic Misconduct | Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at:
For further information, please refer to the Academic Integrity Section in your Unit Description. |
Assignment Description
This assignment consists of two tasks. Task 1 involves designing and simulating a wireless network using NS-2, evaluating the performance of the DSDV routing protocol, and analysing the results. Task 2 involves simulating a smart home using IoT technology in Cisco Packet Tracer, exploring ethical implications, and testing successful connectivity between users and IoT devices at home and outside, accompanied by snapshots and explanations.
Task 1
Wireless networks and wired networks differ in their performance due to the use of guided and unguided mediums for transmission, respectively. Wireless networks use the unguided medium, which can impact their performance. To analyse and simulate wireless networks, the NS-2 (Network Simulator – 2), an open-source discrete event simulator, can be utilized. NS-2 is a widely used simulation tool that can generate trace files for analysis and comes with a network animator for visualizing network performance.
For this assessment, students are tasked with comparing and evaluating the performance of wireless routing protocols using NS-2. They will design a wireless network topology in NS-2 and evaluate the trace files generated for a wireless routing protocol. Students are required to critically analyse the protocol results by plotting graphs and discussing the outcomes.
The students are required to work in a group (4 to 5 students) and report on the following:
Design a wireless network consisting of 15 nodes; the dimensions for the given topology are 500×500. The agent type should be User Datagram Protocol (UDP) and the traffic Constant Bit Rate (CBR). The simulation should run for 100 seconds. Random deployment of nodes is required, and the nodes are required to transmit packets over the network. The wireless node configuration should include the NS – 2 energy model.
Simulate routing protocol Destination Sequenced Distance Vector Routing (DSDV). Critically analyse the trace files in terms of packets sent, received, and dropped. These parameters should be plotted on graphs and discussed in detail.
Include screenshots of the NAM (Network Animator) displaying the nodes deployed during the simulation and add screenshots of the simulation.
Conduct analysis on the results for packets sent, received and dropped for the protocol. Appendix I should include the TCL script used in each simulation.
Task 2
Smart home or home automation technology provides homeowners security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or another networked device. This technology enables you to do things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, and much more.
This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WLAN which enables the users to control things through wireless technology. The users should also be able to control things when
they are outside the home (remote access). This means the WLAN should be connected to a global network that enables the users to have control of devices when they are at work.
The students are required to complete the following steps:
- Explore the ethical implications in the design and implementation of Wireless Local Area Networks (WLANs).
- Test and prove successful connectivity between users and IoT devices when they are at home and when they are outside of the home. You need to take a snapshot for each step of testing followed by the explanation.
Section to be included in the report | Description of the section | Marks |
Introduction | Outline of the report | 5 |
Report Layout | Report layout, style, and language | 5 |
NS – 2 Simulation and network design | Simulation screenshots for routing protocol at 100s simulation time with a description of the ongoing events for DSDV | 20 |
NS – 2 Trace file analysis | Provide a critical analysis of the trace file in terms of packets sent, received, dropped | 10 |
NS – 2 Simulation Results Analysis | Plot and conduct analysis on the graphs for packets sent, received, and dropped for the protocol. | 20 |
Task 2: Explore ethical implications | Investigate and report the ethical implications in the design and implementation of a secure wireless LAN | 10 |
Task 2: Design, analysis, and implementation of smart home | Design, Analysis, and implementation of a smart home using WLAN | 10 |
Testing | Test and prove successful connectivity between users and IoT devices when they are at home and when they are at work. You need to take a snapshot for each step of testing followed by the explanation. | 10 |
Conclusion | Write a summary of the report highlighting the positive and negative points | 5 |
Reference style | Follow the IEEE reference style and format | 5 |