Design and implement secure enterprise wireless networks

Assignment Help Computer Networking
Reference no: EM132525861 , Length: word count:2600

MN603 Wireless Networks and Security Assignment - Melbourne Institute of Technology, Australia

Assessment Title - Implementation of Wireless networks and performance evaluation

Purpose of the assessment (with ULO Mapping) - The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs:

a. Analyse and compare wireless communication protocols;

b. Test and evaluate various wireless networks performance;

d. Apply and evaluate wireless network security techniques with consideration of ethical implications;

e. Design and implement secure enterprise wireless networks.

Assignment Description -

Task 1 -

Wireless networks performance varies from wired networks, the latter uses a guided medium and wireless networks use unguided medium for transmission. To design and simulate wireless networks the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2 simulator is a widely used simulation tool, which could generate trace files for analysis and comes with a network animator to visualize the network performance.

This assessment requires students to compare and evaluate the performance of wireless routing protocol using the NS - 2. The assessment requires students to design a wireless network topology in NS - 2 and evaluate the generated trace files for a wireless routing protocol. The students are required to carry out a critical analysis of the results of the protocol by plotting graphs and discussing the outcomes.

The students are required to:

Design a wireless network consisting of 25 nodes; the dimensions for the given topology are 1000x800. The agent type should be User Datagram Protocol (UDP) and the traffic Constant Bit Rate (CBR). The simulation should run for 300 seconds. Random deployment of nodes is required and the nodes are required to transmit packets over the network. The wireless node configuration should include the NS - 2 energy model.

Run the simulation on routing protocol Destination Sequenced Distance Vector Routing (DSDV) and Ad hoc On DemandDistance Vector (AODV). Critically analyse the trace files in terms of packets sent, received and dropped. These parameters should be plotted on graphs and discussed in detail.

Include screenshots of the NAM (Network Animator) displaying the nodes deployed during the simulation and add screen shots of the simulation.

Conduct comparative analysis on the results for packets sent, received anddropped for the two protocols.

Appendix I should include the tcl srcript used in each simulation.

Task 2 -

Smart home or home automation technology provides homeowners' security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or other networked device. This technology enables you doing things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, and much more.

This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WLAN that enables the users to control the things through wireless technology. The users should also be able to control the things when they are outside home (remote access). This means the WLAN should be connected to a global network that enables the users to have control on devices when they are at work.

The students are required to complete the following steps:

Explore the ethical implications in the design and implementation of Wireless Local Area Networks (WLANs).

Test and prove a successful connectivity between users and IoT devices when they are at home and when they are outside of home. You need to take a snapshot for each step of testing followed by the explanation.

Reference no: EM132525861

Questions Cloud

Electronic ballots : One criticism of electronic ballots for elections is that while intuitive for younger voters who are familiar with using a mouse to point and click,
What rules of thumb for conducting successful performance : Based on your experiences, as well as information found in the chapter, what are some good "rules of thumb" for conducting successful performance appraisal.
Find and calculate profitability index for both projects : Find and calculate Profitability Index for both Projects, Which project should the investor accept? Net Present Value for both Projects.
Describe process for developing talent within organization : Discuss best practices for hiring the best talent and the process for developing that talent within the organization. Be specific as to how you will develop.
Design and implement secure enterprise wireless networks : Analyse and compare wireless communication protocols and Apply and evaluate wireless network security techniques with consideration of ethical implications
Develop different compensation packages for employees : You have recently been promoted and are the company's Chief Human Resources Officer! Your organization has offices in several countries, so how would you.
Research example of cyber terrorism : Using the Web or other resources, research an example of Cyber Terrorism.
General dehumanize manage rial activities : Some say that analytics in general dehumanize manage rial activities, and others say they do not. Discuss arguments for both points of view.
Research example of cyber terrorism : Using the Web or other resources, research an example of Cyber Terrorism.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd