Reference no: EM133696951
Wireless Networks and Security
Assessment Title - Implementation of Wireless networks and performance evaluation
Purpose of the assessment
The purpose of the assignment is to compare NS3 simulator with other current network simulators. Developed, modify and study wireless routing protocols performance with NS3 simulator. Design and implement Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure data transmission.
Students will be able to complete the following ULOs:
Analyse and compare wireless communication protocols.
Compare standard-based technologies used in various networks.
Test and evaluate various wireless networks performance.
Task 1
Q1. Pick any two of the following network simulators, explore and analyze each network simulator and write a short comparative study report of them including NS3 simulator.
OPNET
OMNet++
NetSim
Mininet
QualNet
Task 2
Q2. Write a Multihop Adhoc wireless networks program for simulating in the NS3 simulator. Name the program as your group number. Use number of node 6 and Step 30 Meter in your program. Also give name of the xml file as "Your Group name.xml." Execute the program and execute NetAnim for visualization the performance of your Multihop Adhoc program. Take a screen shot of the created .xml file in NetAnim display. Screen shot of 6 packet captured files. Attach the code of your program in the submission report.
[Hints: You can use Lab-3 task (aodv.cc) program and modify it according to the Task2]
Task 3
Q3.
ABC Hospital is seeking to implement a wireless solution for monitoring and receiving data from patients residing within a 3km radius. The goal is to leverage Wireless Local Area Network (WLAN) technology based on IEEE 802.11 standards to ensure efficient and secure patient data transmission.
Design a wireless solution for supporting the above application using Wireless Local Area Network (WLAN) technology. Design should include the conceptual WLAN architecture based on IEEE 802.11 where a hospital can monitor and receive data from patients living within a 3km radius. Explain and justify your answer with an appropriate diagram.
Identify and explain a particular security attack that could breach patients' personal data.
What prevention technique would you adopt to mitigate the effect of your choice of attack?