Compare wireless communication technologies

Assignment Help Management Information Sys
Reference no: EM132100752

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.

The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Please add these Section to be included in the report:

1. Introduction: Outline of the report.

2. Report Layout: Report layout, style and language.

3. Comparison of cellular networks: Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

4. LTE/LTE-A Architecture: Explore and draw the LTE/LTE-A architecture.

5. Evaluation of LTE/LTE-A Attacks on access and core networks : Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

6. Identification and Analysis: Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7. Conclusion: Write summary of the report

8. Reference style : Follow IEEE reference style

DOCUMENT FORMAT: The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Reference no: EM132100752

Questions Cloud

What are some ways to promote self-determination with client : In doing this, it allowed the clients to build a positive sense of self-efficacy. To the class- what are some ways to promote self-determination with clients?
Construct a query to show the expected payment date : Construct a query to show the expected payment date if invoices are due within 30 days of transaction.
Detailed setup of network devices only for a lan : Local Area Network Design and Setup - Advanced Network Design - Analyse the need for the network for above case study. Investigate and propose a suitable
Find the numbers : Four times the square of the first number increased by the square of the second number is 17. Find the numbers.
Compare wireless communication technologies : Compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.
Midpoint of the line segment with the given endpoints : State the midpoint of the line segment with the given endpoints. (No work required)
How vpn can be advantageous for securing computer : Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3.
What challenges does diversity pose for managers : What challenges does diversity pose for managers? What tips can you offer for effective management of a diverse workforce
Comparison of the existing cellular networks generations : Evaluation of LTE/LTE-A Network Security - Wireless Networks and Security - Evaluate the LTE/LTE-A attacks on the access and core networks - Identify

Reviews

Write a Review

Management Information Sys Questions & Answers

  Impact of information technology on business1 we are all

impact of information technology on business1. we are all quite aware of the impact of information technology on

  Explain the concepts of information assurance

Describe the basic concepts associated with managing information systems related to risks, use, processing, storage.

  Analyze the use of an enterprise software systems

Analyze the use of an Enterprise Software Systems (ESS) in a health care organization with regard to its effects on operational outcomes.

  How the information systems function supports a business

What major features of a business are important for understanding the role of information systems?

  How you provide the information to the senior manager

Prepare and submit a 2- to 3-page paper, discussing how you provide the information to the senior manager. Select either exit interviewing or a presentation.

  Important resource in the health care facility

Justify the function of a master patient index. Discuss how the master patient index is an important resource in the health care facility

  Improve supply chain and quality

Recommendation for improving supply chain and quality - This meeting will be held on the discussion board and you are expected to bring recommendations that address the underlying issues of the various problems.

  How you use collaborative knowledge-sharing in mis class

Explain how you use collaborative knowledge-sharing in your MIS class. Differentiate between techniques that are sponsored by your professor and techniques that you and your classmates have evolved on your own.

  Describe the examinations performed on the items submitted

Forensic evidence reports follow a standard format, with specific content, to describe the examinations performed on the items submitted for analysis.

  How is quality of healthcare data defined

How is quality of healthcare data defined? In terms of accuracy, completeness, or relevance? If there are multiple or conflicting definitions of quality, in your opinion, which is the best definition? What are the factors that contribute to poor data..

  What types of licensure and accreditation do they have

Identify a facility in your area (Maryland preferred) by looking on the Internet. What types of licensure and accreditation do they have? Do they provide ambulatory care or acute care? Did your findings surprise you

  How is the value of it assessed in your organization

What is the level of IT-business integration for your organization? How is the value of IT assessed in your organization? How might your organization improve IT strategic alignment with business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd