Identify the issue related to 5g network coverage

Assignment Help Computer Networking
Reference no: EM132363576

Evaluation of 5G Network and the Security

Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the 5G wireless communication technology with the current technologies in the literature and evaluate the 5G network security. Students will be able to complete the following ULOs:

a. Compare standards-based technologies used in various networks;

b. Test and evaluate various wireless networks performance;

Assignment Description

5G is the newest mobile network technology that is replacing the current 4G technology by providing high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. Mobile service providers are planning to immigrate to this technology to support the growing number of devices that demand internet access, many of them requiring so much bandwidth in order to function normally that 4G simply doesn't cut it anymore.

For further reading, refer to the article "5G Cellular User Equipment: From Theory to Practical Hardware Design" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to identify the challenges in 5G technology compare with the current wireless communication technologies and consider the proposed solutions to address the 5G limitations. Evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of a 5G network

3. Identify and analyse the 5G attacks on the access and core networks.

4. Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation?

Reference no: EM132363576

Questions Cloud

Implementing a postpartum hemorrhage bundle : Technology is an important part of ensuring success in implementing change projects. This is especially true in the case of implementing a postpartum hemorrhage
Who are the readers or potential readers of the document : WRIT 6000-Professional Writing-The University of Sydney-Australia-How are visual or design elements used in the document? Are they effective?
Why do you think political savviness is often : Those who understand it succeed if not survive. Why do you think political savviness is often an underdeveloped skill by a lot of leaders?
Need SRC for one entree one menu and one dessert : Assignment - Need SRC for one entree one menu and one dessert from same cuisine. Make menu on that template basis
Identify the issue related to 5g network coverage : Evaluation of 5G Network and the Security - Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation
Which staffing framework do you recognize in case study : Which staffing framework do you recognize in this case study? Explain its characteristics and the advantages to using this type of framework
Do you plan to use the technology : Technology is integral to successful implementation in many projects, through either support or integration or both. Name at least one technology that could.
What should be diluted earnings per share for the year : At December 31, 2017, Swifty Corporation had 2030000 shares of common stock outstanding. On January 1, 2018, Swifty issued 502000 shares of preferred.
What should be cranes 2018 earnings per common share : During 2018, Crane declared and paid $98000 cash dividends on the common stock and $85000 on the preferred stock.

Reviews

len2363576

8/30/2019 10:56:18 PM

Grade Mark HD 48-60 Excellent Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Motivation /5 Exceptional motivation Comparison of cellular networks /20 Finding is clearly linked and well justified 5G Architecture /10 Excellent understanding of 5G Architecture Evaluation of 5G Attacks on access and core networks /10 Exceptional evaluation of 5G attacks on access and core networks Identification and Analysis of 5G limitation in network coverage /10 Exceptional evaluation of 5G network coverage Conclusion /5 Logic is clear and easy to follow with strong arguments Reference style /5 Clear styles with excellent source of references.

len2363576

8/30/2019 10:56:06 PM

5G Architecture Explore the 5G architecture 10 Identification and Analysis of 5G Attacks Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 10 Identification and Analysis of 5G limitation in network coverage Identify and analyse the issue related to 5G network coverage. Justify the reasons and explain a solution taken to address such limitation 10 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 70

len2363576

8/30/2019 10:56:01 PM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 5-6 sentences) 5 Motivation You need to motivate the reader why 5G? 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

len2363576

8/30/2019 10:55:50 PM

Word limit 1800 – 2300 words Due Date Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd