Comparison of the existing cellular networks

Assignment Help Computer Networking
Reference no: EM132073709 , Length: 1800 Words

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security.

Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Verified Expert

" This is a networking related paper. It contains a comparison of generation of cellular networks. Starting from that the discussion is narrowed down to LTE/LTE-A. Then it covers the evaluation of active and passive attacks to those networks. It also covers security mechanisms to deal with those security issues."

Reference no: EM132073709

Questions Cloud

State the name of the organization : State the name of the organization and describe what its mission and purpose.
Identify the genre or nature of the reading : Briefly introduce the writer and the situation that this reading is about. Identify the genre or nature of the reading.
Discuss the national cultural profiles of saudi arabia : Discuss the national cultural profiles of Saudi Arabia, Mexico, and China that are relevant in cross-cultural business communications.
Evaluate the authors strategy : Evaluate the author's strategy and what you see as the work's likely effectiveness (or lack of effectiveness) for the target audience.
Comparison of the existing cellular networks : MN603 - Wireless Networks and Security - compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber
Revocation of the offer occurs by the offeror : What are the lawful effects on an offer when a revocation of the offer occurs by the offeror? How does a revocation of an offer differ from a rejection
May a minor enter into a contract with an adult : May a minor enter into a contract with an adult? Are both parties equally bound in such a case?
Generally do advertisements constitute offers : Generally, do advertisements constitute offers? If not an offer, how is the advertisement to be classified?
Describe the mystery as though someone is hearing : Since the builders and occupants left no written records, several theories have developed as to the identity of its builders and the functions of the structures

Reviews

inf2073709

11/15/2018 11:11:03 PM

The received assignment was as per my requirement and the rate of plagiarism was low. So, I would recommend this to my friends. Good job. I liked how the plagiarism was minimum. I only did minor review. Thanks

len2073709

8/2/2018 3:45:12 AM

Identification and Analysis /7 Identified the attack and provided excellent justification Identified the attack and provided good justification Identified the attack and provided valid justification Identified the attack and failed to provide valid justification Failed, to identify the attack and provide justification Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2073709

8/2/2018 3:45:06 AM

Comparison of cellular networks /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available LTE/LTE-A Architecture /5 Excellent understanding of LTE/LTE-A Architecture Very good understandi ng of LTE/LTE-A Architecture Good understanding of LTE/LTE-A Architecture Demonstrated adequate understanding of LTE/LTE-A Architecture Poor understanding of LTE/LTE-A architecture Evaluation of LTE/LTE-A Attacks on access and core networks /10 Exceptional evaluation of LTE/LTE attacks on access and core networks Good evaluation of LTE/LTE attacks on access and core networks Evaluation of LTE/LTE attacks on access and core networks Evaluation of a few LTE/LTE attacks on access and core networks Unable to evaluate LTE/LTE attacks on access and core networks

len2073709

8/2/2018 3:44:58 AM

Grade Mark HD 48-60 DI 42-47 CR 36-41 P 30-35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used.

len2073709

8/2/2018 3:44:52 AM

LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5 Evaluation of LTE/LTE-A Attacks on access and core networks Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive. 10 Identification and Analysis Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 7 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 5 Total 60

len2073709

8/2/2018 3:44:46 AM

Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd