Comparison of the existing cellular networks generations

Assignment Help Computer Networking
Reference no: EM132098486 , Length: 1800 Words

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping)

The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Reference no: EM132098486

Questions Cloud

Investigate suitable network designs to match requirements : MN621 - Local Area Network Design and Setup - Advanced Network Design - Melbourne institute of technology - Write a detailed setup of network devices
Defines fraudulent behavior : How important is it for an organization to have a code of conduct that defines fraudulent behavior, and what happens to those individuals who commit such acts?
Analyse and comment on the capital structure of the company : BAFN200 PRINCIPLES OF FINANCE ASSIGNMENT, Australian Catholic University, Australia. Analyse and comment on the capital structure of the company
Analyze database indexes : What is the best way to analyze database indexes so that they run in an optimal fashion. Give examples
Comparison of the existing cellular networks generations : MN603 - Evaluation of LTE/LTE-A Network Security - Wireless Networks and Security - melbourne institute of technology - Identify and analyse the attack
What are the examples to support ideas : Should the data and the database logs be stored on the same drive? Why? What are the examples to support your ideas.
Nature of risk in complex projects : The Nature of Risk in Complex Projects. Based on your review of the content in the article, please include an overall review of the Key Risks
Advantages and disadvantages of computers in drug trials : What are the advantages and disadvantages of computers in drug trials?
How effective the plan was in achieving the stated goals : how effective the plan was (or you believe will be) in achieving the stated goals. Explain why you think it will be or will not be effective

Reviews

len2098486

8/29/2018 1:00:14 AM

Identification and Analysis /7 Identified the attack and provided excellent justification Identified the attack and provided good justification Identified the attack and provided valid justification Identified the attack and failed to provide valid justification Failed, to identify the attack and provide justification Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2098486

8/29/2018 1:00:07 AM

LTE/LTE-A Architecture /5 Excellent understanding of LTE/LTE-A Architecture Very good understandi ng of LTE/LTE-A Architecture Good understanding of LTE/LTE-A Architecture Demonstrated adequate understanding of LTE/LTE-A Architecture Poor understanding of LTE/LTE-A architecture Evaluation of LTE/LTE-A Attacks on access and core networks /10 Exceptional evaluation of LTE/LTE attacks on access and core networks Good evaluation of LTE/LTE attacks on access and core networks Evaluation of LTE/LTE attacks on access and core networks Evaluation of a few LTE/LTE attacks on access and core networks Unable to evaluate LTE/LTE attacks on access and core networks

len2098486

8/29/2018 1:00:00 AM

Marking Rubric for Assignment #1: Total Marks 50 Grade Mark HD 48-60 DI 42-47 CR 36-41 P 30-35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used. Comparison of cellular networks /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len2098486

8/29/2018 12:59:54 AM

LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5 Evaluation of LTE/LTE-A Attacks on access and core networks Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive. 10 Identification and Analysis Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 7 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 5 Total 60

len2098486

8/29/2018 12:59:48 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd