MN603 Wireless Networks and Security Assignment help for Melbourne universities

The MN603 Wireless Networks and Security course is offered by Melbourne University and is an important course for any student who is interested in pursuing a career in network security. This course helps in providing the skills and the knowledge to the students regarding assessing and securing the wireless network effectively. The component of the practical assessment of the course is specifically in demand as it provides hands-on experience to the students in assessing as well as securing the real work wireless networks.  By taking this MN603 course, the students can get help in making sure about the reliability and security of the wireless networks. This assessment needs the students to compare the technologies of communication which can be used with the IOT-enabled devices. This course covers the topics such as Wireless LAN security, wireless network design, wireless network management, and wireless intrusion detection and prevention.

We know that it is not impossible to complete but still, there are lots of problems the students are facing and that is they are having the lack of time as they are doing part-time jobs along with enrolling in the universities due to which they are not able to complete their assignments within deadline with accuracy. Therefore, we are here to help the students in solving their problems by helping them in improving their grades as well as helping in providing the best quality MN603 assignment help at an affordable price. If you will take help from our company for your MN603 Assignment help then we surely guarantee you that you will get the best quality content, timely delivery, 24-hour support, 100 % plagiarism-free content with proof of plag report and help from our experienced experts. In our company, we have experienced experts who have the knowledge and the skills related to the subjects.

Hence, if you want to take help in your MN603 Wireless Networks and Security Assignment, then you can contact us freely at any time.

Assessment Details and Submission Guidelines
Trimester T2 2023
Unit Code MN603
Unit Title Wireless Network and Security
Assessment

Type

Assessment 1 Individual -Formative
Assessment Title Wireless Communication Protocols: A Comparative Analysis and Evaluation
Purpose of the assessment

(with          ULO Mapping)

This assignment assesses the following Unit Learning Outcomes; students should be able to demonstrate their achievements in them.

a. Analyse and compare wireless communication protocols;

Weight 10%
Total Marks 20
Word limit Max 1000 words
Due Date Week 3, 6/08/2023
Submission Guidelines ·      Submit Assignment 1a in a word document in week 3

·      All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.

·      The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font, and 2 cm margins on all four sides of your page with appropriate section headings.

·       Reference sources must be cited in the text of the report, and listed

appropriately at the end in a reference list using IEEE referencing style.

Extension ·      If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at:

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and-

plans/policies-procedures-and-guidelines/assessment-policy

Academic Misconduct ·       Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar          with    the          full      policy             and                  procedure       available           at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity

Section in your Unit Description.

Prepared by: Dr. Ammar Alazab                          Moderated by: Dr Wanod Kumar                                July 2023

 

Assignment Description

 

The objective of this assignment is to conduct a comprehensive analysis and comparison of various wireless communication protocols. Your task is to write a report focusing on two selected wireless communication protocols from the following list:

  • 11ax Protocol (Wi-Fi 6)
  • 11ac Protocol (Wi-Fi 5)
  • Wi-Fi (802.11x standards)
  • ZigBee
  • WiMax
  • Z-Wave
  • NFC
  • 6LoWPAN
  • Bluetooth
  • RFID
  • WLAN
  • IoT
  • 5G

Your report should thoroughly cover the following points for each chosen protocol:

  1. Introduction to the selected technologies
    • Introduce the importance of wireless communication protocols in modern
    • Explain the significance of wireless protocols in enabling seamless connectivity and data
  2. Use case example(s) of the selected
    • Select a minimum of two wireless communication protocols for Recommended protocols include Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC, LTE, 5G, and others.
    • Justify your selection, highlighting the relevance and prevalence of each protocol in today’s technology
    • Investigate the real-world applications of each wireless communication protocol in various industries and consumer
    • Analyse how each protocol caters to specific use cases and how it addresses the challenges in those
  3. Technical backgrounds on the selected technologies
    • Explore the technical specifications of each selected protocol, such as data transfer rates, frequency bands used, range, and compatibility with different
    • Compare and contrast these technical aspects to understand the unique capabilities of each
  4. Compare and contrast the two wireless communication protocols you have chosen, highlighting the similarities and differences between
  • Analyse the performance metrics of each protocol, including throughput, latency, and power consumption.
  • Compare the efficiency of these protocols in handling different types of data and multimedia
  1. Security vulnerabilities and resolutions of the selected technologies
    • Evaluate the security features implemented in each protocol to safeguard data integrity and user
    • Examine the vulnerabilities and potential threats associated with each

Marking Criteria:

Section to be included in

the report

Description Mar

ks

Section1: introduction and case examples ·         Introduce the importance of wireless communication protocols in modern society.

·         Explain the significance of wireless protocols in enabling seamless connectivity and data transfer.

·         Select a minimum of two wireless communication protocols for analysis. Recommended protocols include Wi-Fi (802.11x standards), Bluetooth, Zigbee, NFC, LTE, 5G, and others.

·         Justify your selection, highlighting the relevance and prevalence of each protocol in today’s technology landscape.

·         Investigate the real-world applications of each wireless communication protocol in various industries and consumer products.

·         Analyse how each protocol caters to specific use cases

and how it addresses the challenges in those domains.

4
Section 2: Technical backgrounds and Potential benefits ·         Describe how the selected wireless technologies operate

– in particular for the aforementioned business environment (and their potential benefits)

·         Explore the technical specifications of each selected protocol, such as data transfer rates, frequency bands used, range, and compatibility with different devices.

·         Compare and contrast these technical aspects to

understand the unique capabilities of each protocol

5
Section 3: Comparison ·         Compare and contrast the two wireless communication protocols you have chosen, highlighting the similarities and differences between them.

·         Analyse the performance metrics of each protocol, including throughput, latency, and power consumption.

·         Compare the efficiency of these protocols in handling different types of data and multimedia content.

5
Section 4: Security vulnerabilities and resolutions Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing 4
Report structure Inadequate structure, careless presentation, poor writing, word limits. Presents and analyses facts and evidence that are relevant to the topic. All sources used should be

acknowledged and referenced throughout.

1
Reference style (IEEE) Minimum 5 Proper different referencing resources 1
Total 20

Marking Rubric for Exercise Answers

Grade Mark HD 80%+ D 70%-79% CR 60%-69% P 50%-59% Fail

< 50%

Excellent Very Good Good Satisfactory Unsatisfactory
 

Section 1- introduction and case example /4

Explanation is

clear and easy to follow with strong argument

 

Consistency logical and convincing

 

Consistency logical and convincing

 

Adequate cohesion and conviction

Argument is confused and disjointed
 

 

Section 2 – Technical backgrounds and Potential benefits /5

The presented solution demonstrated an extreme degree of details on wireless technology operations.  

The presented solution demonstrated a high degree of details on wireless technology operations.

The presented solution demonstrate d an average degree of details on wireless technology operations.  

The presented solution demonstrated a low degree of details on wireless technology operations

The

presented solution demonstrate d a poor degree of details on wireless technology operations.

Section 3: Provides a Provides a Provides a Comparison is Comparison
Comparison clear and comparison of limited inadequate. is missing.
/5 concise the two comparison of
comparison of wireless the two
the two communicatio wireless
wireless n protocols communicatio
communicatio chosen, but n protocols
n protocols with some chosen, with
chosen, minor errors significant
highlighting or omissions. errors or
their omissions.
similarities and
differences.
The presented  

The presented solution demonstrated a high degree of details on wireless technology security concerns.

The

presented solution demonstrate d a poor degree of details on wireless technology security concerns.

solution The presented
Section 4 – demonstrated The presented solution
Security an extreme solution demonstrated a
vulnerabilitie degree of demonstrate d low of details
s s and details on an average on wireless
resolutions wireless degree of technology
/4 technology details. security
security concerns.
concerns.

 

 

Report structure /1

Proper writing. Professionally presented Properly spoken, with some minor deficiencies Mostly good, but some structure or presentation problems  

Acceptable presentation

Poor structure, careless presentation
 

Reference style (IEEE)

/1

 

Clear styles with excellent source of references.

excellent

source of references. Clear referencing/ style

 

Generally good referencing/ style

 

Unclear referencing/styl e

 

Lacks consistency with many errors