Comparison of the existing cellular networks generations

Assignment Help Computer Networking
Reference no: EM132100748

Evaluation of LTE/LTE-A Network Security

Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the wireless communication technologies and evaluate the LTE/LTE-A network security. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

Verified Expert

The work is in 1800 words where the focus is on how the networks are worked upon through communication spectrum. It includes the IEEE format and the focus is on the lTE attacks and architectures which helps in determining about the issues related to system procedures.

Reference no: EM132100748

Questions Cloud

Compare wireless communication technologies : Compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.
Midpoint of the line segment with the given endpoints : State the midpoint of the line segment with the given endpoints. (No work required)
How vpn can be advantageous for securing computer : Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3.
What challenges does diversity pose for managers : What challenges does diversity pose for managers? What tips can you offer for effective management of a diverse workforce
Comparison of the existing cellular networks generations : Evaluation of LTE/LTE-A Network Security - Wireless Networks and Security - Evaluate the LTE/LTE-A attacks on the access and core networks - Identify
Fundamental counting principle : Use the fundamental counting principle to solve. An ice cream store sells 2 drinks, in 5 sizes, and 8 flavors. In how many ways can a customer order a drink?
What is the primary goal of the small business : In the growth stage of the startup process model, what is the primary goal of the small business?
Determine the three levels of management hierarchy : This level of management has managers such as CEO, vice president, president and board of directors.
What is the volume of the great pyramid in cubic yards : The Great Pyramid outside Cairo, Egypt, has a square base measuring 756 feet on a side and a height of 480 feet.

Reviews

inf2100748

12/18/2018 12:36:59 AM

I made the payment for assignment of mn603.i want my assignment without plagiarism along with turnitin report.so i can get good grades.i want the perfect assignment from you guys.many students from my college approaches you also for same assignment.that is why i do not want any plagiarism pls add 1g.2g.3g.4g.5g as evolution of mobile network in assignment The assignment was well written and very precisely done. They explained each and every part of the solution. Every answer is well explained and points are highlighted. Thank you for the solution.

len2100748

8/31/2018 12:31:39 AM

Identification and Analysis /7 Identified the attack and provided excellent justification Identified the attack and provided good justification Identified the attack and provided valid justification Identified the attack and failed to provide valid justification Failed, to identify the attack and provide justification Conclusion /4 Logic is clear and easy to follow with strong arguments Consistency logical and convincing Mostly consistent logical and convincing Adequate cohesion and conviction Argument is confused and disjointed Reference style /5 Clear styles with excellent source of references. Clear referencing style Generally good referencing style Sometimes clear referencing style Lacks consistency with many errors

len2100748

8/31/2018 12:31:33 AM

LTE/LTE-A Architecture /5 Excellent understanding of LTE/LTE-A Architecture Very good understandi ng of LTE/LTE-A Architecture Good understanding of LTE/LTE-A Architecture Demonstrated adequate understanding of LTE/LTE-A Architecture Poor understanding of LTE/LTE-A architecture Evaluation of LTE/LTE-A Attacks on access and core networks /10 Exceptional evaluation of LTE/LTE attacks on access and core networks Good evaluation of LTE/LTE attacks on access and core networks Evaluation of LTE/LTE attacks on access and core networks Evaluation of a few LTE/LTE attacks on access and core networks Unable to evaluate LTE/LTE attacks on access and core networks

len2100748

8/31/2018 12:31:14 AM

Marking Rubric for Assignment #1: Total Marks 50 Grade Mark HD 48-60 DI 42-47 CR 36-41 P 30-35 Fail <30 Excellent Very Good Good Satisfactory Unsatisfactory Introduction /4 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Topics are relevant and soundly analysed. Generally relevant and analysed. Some relevance and briefly presented. This is not relevant to the assignment topic. Report Layout /5 Exceptional report layout, style and language used Very good report layout, style and language used Good report layout, style and language used Acceptable report layout, style and language used. Poor report layout, style and language used. Comparison of cellular networks /12 Finding is clearly linked and well justified Finding is clearly linked and justified Finding is linked and convincing Finding is not linked and unjustified Finding is not available

len2100748

8/31/2018 12:31:05 AM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 4 Report Layout Report layout, style and language 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20 LTE/LTE-A Architecture Explore the LTE/LTE-A architecture 5 Evaluation of LTE/LTE-A Attacks on access and core networks Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive. 10 Identification and Analysis Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 7 Conclusion Write summary of the report 4 Reference style Follow IEEE reference style 5 Total 60

len2100748

8/31/2018 12:30:56 AM

All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd