Explore the architecture of a 5g network

Assignment Help Computer Network Security
Reference no: EM132362125 , Length: word count:1900

Evaluation of 5G Network and the Security

Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the 5G wireless communication technology with the current technologies in the literature and evaluate the 5G network security. Students will be able to complete the following ULOs:

a. Compare standards-based technologies used in various networks;

b. Test and evaluate various wireless networks performance;

Assignment Description

5G is the newest mobile network technology that is replacing the current 4G technology by providing high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. Mobile service providers are planning to immigrate to this technology to support the growing number of devices that demand internet access, many of them requiring so much bandwidth in order to function normally that 4G simply doesn't cut it anymore.

For further reading, refer to the article "5G Cellular User Equipment: From Theory to Practical Hardware Design" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to identify the challenges in 5G technology compare with the current wireless communication technologies and consider the proposed solutions to address the 5G limitations. Evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of a 5G network

3. Identify and analyse the 5G attacks on the access and core networks.

4. Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation?

Reference no: EM132362125

Questions Cloud

High-performance culture : Leadership actions or managerial practices NOT normally taken to foster a results-oriented, high-performance culture include
Identify financial and ICT issues for key business functions : MOD003353 Business Environment Assignment, Anglia Ruskin University, UK. Identify financial and ICT issues for key business functions
Earth with light and the warmth of hospitality : A superior example of a company vision that is short, specific, memorable, clearly articulated, and forward-looking is
How denaturing protein alters the function of protein : Describe how denaturing a protein alters the function of that protein. Explain how water in your body helps to regulate body temperature
Explore the architecture of a 5g network : Compare standards-based technologies used in various networks - Identify and analyse the issue related to 5G network coverage? What is a solution to address
Write a java application that uses an interactive gui : COIT20256 Data Structures and Algorithms-Central Queensland University-Australia-Write a Java Application that uses an interactive Graphical User Interface.
What are the pros and cons for federal and private sector : What are the pros and cons for the federal and private sectors to collaborate to combat cyber crimes and criminals?
Provide a general concluding statement : Provide a general concluding statement of why this is significant/why the audience should care/how this debate has contemporary relevance
Regulate pornography and to develop definitions : The attempt to regulate pornography and to develop definitions that do not run afoul of the First Amendment is expanding as the Internet becomes

Reviews

Write a Review

Computer Network Security Questions & Answers

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  Run the simulation on two different routing protocols

MN603 Wireless Networks and Security. MIT Australia. Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA

  Relationships between a trusted and an untrusted network

Discuss biometrics. Identify the most widely used technology and why this is the case. What are the relationships between a trusted and an untrusted network

  Why does symmetric cryptography work best for applications

The purpose of the research paper is to give a thorough survey of Symmetric Cryptography. Why does symmetric cryptography work best for these applications?

  Leaders and managers

One of business' contemporary rules states that organizations should move away from some top leaders and many managers to leaders at every level and few managers.

  Electronic and physical threats to communications networks

What are the predominant electronic and physical threats to communications networks

  Description of the task the pseudo-code

Create a Word document. The document should contain: a brief description of the task the pseudo-code associated with the task. Create a Visual Logic file to execute each of the tasks

  What is a honeypot

How has honeypots been used in the field of national security?

  Address of the router that computer

1. Your boss wants to know the address of the router that his computer is using. What do you tell him?

  What are three ways that even every forecast model

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

  How do clients receive updates in the absence of wsus

Why might READ WRITE and READ CREATE rights pose a security threat? How do clients receive updates in the absence of WSUS

  What is information security policy?

What is information security policy? Why it is critical to the success of the information security program

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd