Wireless Networks and Security (MN603) Assignment Help

                                                                                                                                                                                     Click Here For The Solution

Assessment Details and Submission Guidelines

Trimester 

T1 2024

Unit Code 

MN603

Unit Title 

Wireless Networks and Security

Assessment  

Type

Assignment 2 (Group assignment, 3-4 members per group)

Assessment  

Title

Implementation of Wireless networks and performance evaluation

Purpose of the  assessment  

(with ULO  Mapping)

The purpose of the assignment is to compare NS3 simulator with other current  network simulators. Developed, modify and study wireless routing protocols  performance with NS3 simulator. Design and implement Wireless Local Area  Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient  and secure data transmission. 

Students will be able to complete the following ULOs: 

Analyse and compare wireless communication protocols.  Compare standard-based technologies used in various networks. Test and evaluate various wireless networks performance.

Weight 

20%

Total Marks 

100

Word limit 

2000-3000

Due Date 

Week 11; 30/05/2024

Submission  

Guidelines

All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.  

The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font and 2 cm margins on all four sides of your page with appropriate section  headings.  

Reference sources must be cited in the text of the report and listed  appropriately at the end in a reference list using IEEE referencing style.

Extension 

If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:  

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Assignment Description 

This assignment consists of three tasks.  

Task 1 Study and analysis of different existing network simulation software tools. 

Task 2. Involving analysis and modification of current the NS3 lab exercises code.

 

Q1. Pick any two of the following network simulators, explore and analyze each network simulator and write a short comparative study report of them including NS3 simulator. OPNET 

OMNet++ 

NetSim 

Mininet 

QualNet 

 

Q2. Write a Multihop Adhoc wireless networks program for simulating in the NS3 simulator. Name  the program as your group number. Use number of node 6 and Step 30 Meter in your program.  Also give name of the xml file as “Your Group name.xml.” Execute the program and execute  NetAnim for visualization the performance of your Multihop Adhoc program. Take a screen shot of  the created .xml file in NetAnim display. Screen shot of 6 packet captured files. Attach the code of  your program in the submission report. 

Q3. Case Study:  

ABC Hospital is seeking to implement a wireless solution for monitoring and receiving data from  patients residing within a 3km radius. The goal is to leverage Wireless Local Area Network (WLAN)  technology based on IEEE 802.11 standards to ensure efficient and secure patient data  transmission. 

a) Design a wireless solution for supporting the above application using Wireless Local Area  Network (WLAN) technology. Design should include the conceptual WLAN architecture  based on IEEE 802.11 where a hospital can monitor and receive data from patients living  within a 3km radius. Explain and justify your answer with an appropriate diagram. 

b) Identify and explain a particular security attack that could breach patients’ personal data.  c) What prevention technique would you adopt to mitigate the effect of your choice of attack?  

Marking Guide 

Section to be included in the  report

Description of the section 

Marks

Task-1: Comparative study of  selected two Network  

simulators with NS3  

simulator

Detail Comparative study  report of three Network  simulators (two selected  choice and NS3). Including  features, advantages, and  disadvantages. Each simulator  description in the study will be  5 marks each. 

5+5+5=15

Task-2: NS3 Simulation 

Correctly written the Multihop  Adhoc wireless networks  program using number of node  6 and step 30 M. Provided  codes.

8

 

Appropriately created .xml file.  And generated 6 packets  captured files. Provided Valid  Screen shots. 

7

Task-3: Case Study 

   
 

Introduction 

3

 

Design and implementation of  a secure wireless LAN

6

 

Identify and explain a  particular security attack.

4

 

Prevention and mitigation  techniques of your choice of  attack.

4

Conclusion 

Write a summary of the report  highlighting the positive and  negative points.

3

Reference style 

Follow the IEEE reference style.  Reference should be cited in  the body of the report.

2

Format of the report 

Report Layout and Format.  Format must be looks  professional.

3

Grade 

Mark

HD 

80-100

70-79

CR 

60-69

50-59

Fail 

<50

 

Excellent 

Very Good 

Good 

Satisfactory 

Unsatisfactory

Task 1

         

Written  

comparative  

study report on  three network  simulators  

including NS3.  /15

Two simulators  

have sleeted from  the list. Explored,  studied, and  

compared their  

features with NS3  simulator and  

written report in  the form of table.  Advantages and  

disadvantages are  heighted. 

Selection of  simulators  

are relevant  and soundly  analysed  

and written  comparative  study report.

Selection of  

simulators are  generally  

relevant and  

comparative  

study reported.

Selection of  

simulators have  some relevance  comparative  

study reported  but not up to  

the standar. 

No relevance of  the selection of  the simulator  

and the report  is poorly written

Task 2  

NS3 Simulation 

Correctly written  the Multihop  Adhoc wireless  networks program  using number of  node 6 and step 30  M. Provided codes.

Very good.  

Written the  Multihop  

Adhoc 

wireless  

networks  

program  

using  

number of  

node 6 and  

step 30 M.  

Provided  

codes

Good in writing  the Multihop  

Adhoc wireless  networks  

program. Used number of node  6 number of  

nodes used  

step 30 M.  

Provided codes

Satisfactorily  

writing the  

Multihop Adhoc wireless  

networks  

program. Used 

number of node  6 number of  

nodes used step  30 M. Provided  codes but hard  to find the  

location where  nodes number  are included.

Poorly or not  

attempt writing  the code. 

 

Appropriately  

created .xml file.  And generated 6  packets captured files. Provided Valid  Screen shots. 

Created .xml file. And  generated  

packets  

captured 

files.  

Provided  

relevant  

screen shots. 

Properly named  the  

.xml file. And  

generated  

packets  

captured files.  Provided  

relevant visible  screen shots

Satisfactorily 

named the  

.xml file. And  

generated  

packets  

captured files.  Relevant screen  shots are not  

clearly visible

Poor  

screenshots.  

Hard to find the  .xml 

File. No output  of the screen  

shots.

Task 2  

Case study 

         

Introduction/3 

All topics are  

pertinent and  

covered in depth.  Ability to think  

critically and source  material is  

demonstrated

Topics are  

relevant and  soundly  

analysed.

Generally  

relevant and  

analysed.

Some relevance  and briefly  

presented.

This is not  

relevant to the  assignment  

topic.

Design and  

implementation  of a secure  

wireless LAN/6

Demonstrated  

excellent ability to  think critically and  present an  

exceptional design  considering all the  requirements

Demonstrat 

ed good  

ability to  

think  

critically and  present an  

exceptional  design  

considering  all the  

requirement  s

Demonstrate d  good ability to  think critically  and present a  good design  

considering all  the  

requirements.

Demonstrated  ability to think  critically and  

present a design

Did not 

demonstrate 

ability to think 

critically and 

present a 

design.

Identify and  

explain a  

particular  

security attack.  /4

Excellently  

identified  

appropriate cyber attacks and well  

explained the  

attacks. 

Very good in  identificatio 

n of attacks  and  

appropriatel y explained  the attack  

scenario. 

Good  

understanding  of identification  and explanation  on attacks. 

Fair  

identifications  

and explanation  on attacks. 

Unable to  

identify and  

explain the  

attacks.

Prevention and  mitigation  

techniques of  

your choice of  attack. /4 

Excellent strategy  of prevention and  mitigation  

techniques of the  attacks. 

Very good of  your prosed  strategy of  

prevention  

and  

mitigation  

techniques  

of the  

attacks.

Good strategy  of prevention  

and mitigation  techniques of  

the attacks.

Fair strategy of  your prosed  

prevention and  mitigation  

methods of the  attacks.

Not relevancy of  your prosed  

prevention and  mitigation  

methods of the  attacks.

Conclusion/3 

Excellent summary of the report  

highlighting all the  positive and  

negative points

Very good  

summary of  the report  

highlighting  most of the  positive and  negative  

points

Good  

summary of the  report  

highlighting  

significant  

number of the  positive and  

negative points. 

Fair summary  of the report  

highlighting a  

few numbers of  the positive and  negative points.

Poor summary  of the report.  

Failed to be  

highlighting  

positive and  

negative points.

Reference  

style/2

Clear styles with  

excellent source of  references. Cited  well in the body of  the report. 

Clear  

referencing  

style and  

cited in the  

body of the  report.

Generally good  referencing  

style

Sometimes clear  referencing style

Lacks  

consistency  

with many  

errors

Format and the report Layout. 

/3

Exceptional report  layout, style and  

language used

Very good  

report  

layout, style  and  

language  

used

Good report  

layout, style  

and language  

used

Acceptable  

report layout,  

style and  

language used

Poor report  

layout, style and  language used