Wireless Networks and Security (MN603) Assignment Help

 Click Here For The Solution

Assessment Details and Submission Guidelines

Trimester

T1 2024

Unit Code

MN603

Unit Title

Wireless Networks and Security

Assessment

Type

Assignment 2 (Group assignment, 3-4 members per group)

Assessment

Title

Implementation of Wireless networks and performance evaluation

Purpose of the  assessment

(with ULO  Mapping)

The purpose of the assignment is to compare NS3 simulator with other current  network simulators. Developed, modify and study wireless routing protocols  performance with NS3 simulator. Design and implement Wireless Local Area  Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient  and secure data transmission.

Students will be able to complete the following ULOs:

• Analyse and compare wireless communication protocols.  • Compare standard-based technologies used in various networks. • Test and evaluate various wireless networks performance.

Weight

20%

Total Marks

100

Word limit

2000-3000

Due Date

Week 11; 30/05/2024

Submission

Guidelines

• All work must be submitted on Moodle by the due date along with a  completed Assignment Cover Page.

• The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)  font and 2 cm margins on all four sides of your page with appropriate section  headings.

• Reference sources must be cited in the text of the report and listed  appropriately at the end in a reference list using IEEE referencing style.

Extension

• If an extension of time to submit work is required, a Special Consideration  Application must be submitted directly on AMS. You must submit this  application three working days prior to the due date of the assignment.  Further information is available at:

https://www.mit.edu.au/about-us/governance/institute-rules-policies-and plans/policies-procedures-and-guidelines/assessment-policy

Assignment Description

This assignment consists of three tasks.

Task 1 Study and analysis of different existing network simulation software tools.

Task 2. Involving analysis and modification of current the NS3 lab exercises code.

Q1. Pick any two of the following network simulators, explore and analyze each network simulator and write a short comparative study report of them including NS3 simulator. • OPNET

• OMNet++

• NetSim

• Mininet

• QualNet

Q2. Write a Multihop Adhoc wireless networks program for simulating in the NS3 simulator. Name  the program as your group number. Use number of node 6 and Step 30 Meter in your program.  Also give name of the xml file as “Your Group name.xml.” Execute the program and execute  NetAnim for visualization the performance of your Multihop Adhoc program. Take a screen shot of  the created .xml file in NetAnim display. Screen shot of 6 packet captured files. Attach the code of  your program in the submission report.

Q3. Case Study:

ABC Hospital is seeking to implement a wireless solution for monitoring and receiving data from  patients residing within a 3km radius. The goal is to leverage Wireless Local Area Network (WLAN)  technology based on IEEE 802.11 standards to ensure efficient and secure patient data  transmission.

a) Design a wireless solution for supporting the above application using Wireless Local Area  Network (WLAN) technology. Design should include the conceptual WLAN architecture  based on IEEE 802.11 where a hospital can monitor and receive data from patients living  within a 3km radius. Explain and justify your answer with an appropriate diagram.

b) Identify and explain a particular security attack that could breach patients’ personal data.  c) What prevention technique would you adopt to mitigate the effect of your choice of attack?

Marking Guide

Section to be included in the  report

Description of the section

Marks

Task-1: Comparative study of  selected two Network

simulators with NS3

simulator.

Detail Comparative study  report of three Network  simulators (two selected  choice and NS3). Including  features, advantages, and  disadvantages. Each simulator  description in the study will be  5 marks each.

5+5+5=15

Task-2: NS3 Simulation

Correctly written the Multihop  Adhoc wireless networks  program using number of node  6 and step 30 M. Provided  codes.

8

Appropriately created .xml file.  And generated 6 packets  captured files. Provided Valid  Screen shots.

7

Task-3: Case Study

Introduction

3

Design and implementation of  a secure wireless LAN

6

Identify and explain a  particular security attack.

4

Prevention and mitigation  techniques of your choice of  attack.

4

Conclusion

Write a summary of the report  highlighting the positive and  negative points.

3

Reference style

Follow the IEEE reference style.  Reference should be cited in  the body of the report.

2

Format of the report

Report Layout and Format.  Format must be looks  professional.

3

Grade

Mark

HD

80-100

D

70-79

CR

60-69

P

50-59

Fail

<50

Excellent

Very Good

Good

Satisfactory

Unsatisfactory

Task 1

Written

comparative

study report on  three network  simulators

including NS3.  /15

Two simulators

have sleeted from  the list. Explored,  studied, and

compared their

features with NS3  simulator and

written report in  the form of table.  Advantages and

disadvantages are  heighted.

Selection of  simulators

are relevant  and soundly  analysed

and written  comparative  study report.

Selection of

simulators are  generally

relevant and

comparative

study reported.

Selection of

simulators have  some relevance  comparative

study reported  but not up to

the standar.

No relevance of  the selection of  the simulator

and the report  is poorly written

Task 2

NS3 Simulation

Correctly written  the Multihop  Adhoc wireless  networks program  using number of  node 6 and step 30  M. Provided codes.

Very good.

Written the  Multihop

Adhoc

wireless

networks

program

using

number of

node 6 and

step 30 M.

Provided

codes

Good in writing  the Multihop

Adhoc wireless  networks

program. Used number of node  6 number of

nodes used

step 30 M.

Provided codes

Satisfactorily

writing the

Multihop Adhoc wireless

networks

program. Used

number of node  6 number of

nodes used step  30 M. Provided  codes but hard  to find the

location where  nodes number  are included.

Poorly or not

attempt writing  the code.

Appropriately

created .xml file.  And generated 6  packets captured files. Provided Valid  Screen shots.

Created .xml file. And  generated

packets

captured

files.

Provided

relevant

screen shots.

Properly named  the

.xml file. And

generated

packets

captured files.  Provided

relevant visible  screen shots

Satisfactorily

named the

.xml file. And

generated

packets

captured files.  Relevant screen  shots are not

clearly visible

Poor

screenshots.

Hard to find the  .xml

File. No output  of the screen

shots.

Task 2

Case study

Introduction/3

All topics are

pertinent and

covered in depth.  Ability to think

critically and source  material is

demonstrated

Topics are

relevant and  soundly

analysed.

Generally

relevant and

analysed.

Some relevance  and briefly

presented.

This is not

relevant to the  assignment

topic.

Design and

implementation  of a secure

wireless LAN/6

Demonstrated

excellent ability to  think critically and  present an

exceptional design  considering all the  requirements

Demonstrat

ed good

ability to

think

critically and  present an

exceptional  design

considering  all the

requirement  s

Demonstrate d  good ability to  think critically  and present a  good design

considering all  the

requirements.

Demonstrated  ability to think  critically and

present a design

Did not

demonstrate

ability to think

critically and

present a

design.

Identify and

explain a

particular

security attack.  /4

Excellently

identified

appropriate cyber attacks and well

explained the

attacks.

Very good in  identificatio

n of attacks  and

appropriatel y explained  the attack

scenario.

Good

understanding  of identification  and explanation  on attacks.

Fair

identifications

and explanation  on attacks.

Unable to

identify and

explain the

attacks.

Prevention and  mitigation

techniques of

your choice of  attack. /4

Excellent strategy  of prevention and  mitigation

techniques of the  attacks.

Very good of  your prosed  strategy of

prevention

and

mitigation

techniques

of the

attacks.

Good strategy  of prevention

and mitigation  techniques of

the attacks.

Fair strategy of  your prosed

prevention and  mitigation

methods of the  attacks.

Not relevancy of  your prosed

prevention and  mitigation

methods of the  attacks.

Conclusion/3

Excellent summary of the report

highlighting all the  positive and

negative points

Very good

summary of  the report

highlighting  most of the  positive and  negative

points

Good

summary of the  report

highlighting

significant

number of the  positive and

negative points.

Fair summary  of the report

highlighting a

few numbers of  the positive and  negative points.

Poor summary  of the report.

Failed to be

highlighting

positive and

negative points.

Reference

style/2

Clear styles with

excellent source of  references. Cited  well in the body of  the report.

Clear

referencing

style and

cited in the

body of the  report.

Generally good  referencing

style

Sometimes clear  referencing style

Lacks

consistency

with many

errors

Format and the report Layout.

/3

Exceptional report  layout, style and

language used

Very good

report

layout, style  and

language

used

Good report

layout, style

and language

used

Acceptable

report layout,

style and

language used

Poor report

layout, style and  language used