Identify the issue related to 5g network coverage

Assignment Help Computer Networking
Reference no: EM132363576

Evaluation of 5G Network and the Security

Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the 5G wireless communication technology with the current technologies in the literature and evaluate the 5G network security. Students will be able to complete the following ULOs:

a. Compare standards-based technologies used in various networks;

b. Test and evaluate various wireless networks performance;

Assignment Description

5G is the newest mobile network technology that is replacing the current 4G technology by providing high data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massive device connectivity. Mobile service providers are planning to immigrate to this technology to support the growing number of devices that demand internet access, many of them requiring so much bandwidth in order to function normally that 4G simply doesn't cut it anymore.

For further reading, refer to the article "5G Cellular User Equipment: From Theory to Practical Hardware Design" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to identify the challenges in 5G technology compare with the current wireless communication technologies and consider the proposed solutions to address the 5G limitations. Evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of:

a. Communication spectrum
b. modulation techniques
c. medium access control mechanism
d. Network speed and bandwidth utilization
e. Security techniques and risk

2. Explore the architecture of a 5G network

3. Identify and analyse the 5G attacks on the access and core networks.

4. Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation?

Reference no: EM132363576

Questions Cloud

Implementing a postpartum hemorrhage bundle : Technology is an important part of ensuring success in implementing change projects. This is especially true in the case of implementing a postpartum hemorrhage
Who are the readers or potential readers of the document : WRIT 6000-Professional Writing-The University of Sydney-Australia-How are visual or design elements used in the document? Are they effective?
Why do you think political savviness is often : Those who understand it succeed if not survive. Why do you think political savviness is often an underdeveloped skill by a lot of leaders?
Need SRC for one entree one menu and one dessert : Assignment - Need SRC for one entree one menu and one dessert from same cuisine. Make menu on that template basis
Identify the issue related to 5g network coverage : Evaluation of 5G Network and the Security - Identify and analyse the issue related to 5G network coverage? What is a solution to address this limitation
Which staffing framework do you recognize in case study : Which staffing framework do you recognize in this case study? Explain its characteristics and the advantages to using this type of framework
Do you plan to use the technology : Technology is integral to successful implementation in many projects, through either support or integration or both. Name at least one technology that could.
What should be diluted earnings per share for the year : At December 31, 2017, Swifty Corporation had 2030000 shares of common stock outstanding. On January 1, 2018, Swifty issued 502000 shares of preferred.
What should be cranes 2018 earnings per common share : During 2018, Crane declared and paid $98000 cash dividends on the common stock and $85000 on the preferred stock.

Reviews

len2363576

8/30/2019 10:56:18 PM

Grade Mark HD 48-60 Excellent Introduction /5 All topics are pertinent and covered in depth. Ability to think critically and source material is demonstrated Motivation /5 Exceptional motivation Comparison of cellular networks /20 Finding is clearly linked and well justified 5G Architecture /10 Excellent understanding of 5G Architecture Evaluation of 5G Attacks on access and core networks /10 Exceptional evaluation of 5G attacks on access and core networks Identification and Analysis of 5G limitation in network coverage /10 Exceptional evaluation of 5G network coverage Conclusion /5 Logic is clear and easy to follow with strong arguments Reference style /5 Clear styles with excellent source of references.

len2363576

8/30/2019 10:56:06 PM

5G Architecture Explore the 5G architecture 10 Identification and Analysis of 5G Attacks Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack. 10 Identification and Analysis of 5G limitation in network coverage Identify and analyse the issue related to 5G network coverage. Justify the reasons and explain a solution taken to address such limitation 10 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 70

len2363576

8/30/2019 10:56:01 PM

Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 5-6 sentences) 5 Motivation You need to motivate the reader why 5G? 5 Comparison of cellular networks Comparison of the existing cellular networks generations in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. Network speed and bandwidth utilization e. Security techniques and risk 20

len2363576

8/30/2019 10:55:50 PM

Word limit 1800 – 2300 words Due Date Submission Guidelines • All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. • The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. • Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Write a Review

Computer Networking Questions & Answers

  Characteristics of mobile devices that need to be

1 a major purpose of an organizational knowledge base is to support and allow .a. knowledge sharingb.e-learningc.

  Discuss a minimum of five event types found in a dhcp log

What plan will you follow to assign printers to all the users in the organization? Discuss a minimum of five event types found in a DHCP log and describe what they refer to

  Designing the school network network with guest network

MN503 Overview of Internetworking Assignment - Primary School Network Design with Guest Network. Melbourne Institute of Technology. Designing School Network

  Design a form for gathering the given information

Design a form for gathering this information, including space for items such as model number, serial number, NIC type, MAC address and logical address.

  Based on the barr 2010 article how does ibms cloud

question 1 based on the barr 2010 article how does ibms cloud computing services compare with those provided by

  What is the purpose of a wide area network connection

Explain the expected difference when running a traceroute from the home network to the remote user using the IP address for the remote user's router interface.

  The network design executive powerpoint presentation

In this assignment you are to submit the Network Design Executive PowerPoint Presentation for the term paper.

  What is the maximum data capacity for traffic

What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store?

  Principal organizations responsible for internet governance

Explain how FTTH works.- What are some future technologies that might change how we access the Internet?- Explain how WiMax works.

  Explain what is meant by computer network

Describe a DBMS and its functions. List, at minimum, three of the popular DBMS products and give a brief description of each. Identify the disadvantages of employee use of mobile systems at work and discuss each of the disadvantages.

  Why private-public keys cannot be used in creating a mac

In RSA, why can't Bob choose 1 as the public key e? Explain why private-public keys cannot be used in creating a MAC.

  Compare the different vpn services offered

Using the Internet, locate TWO companies that provide VPN services. Compare the TWO different services offered. Include their services, pricing, and make.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd