ITC513 Wireless Networking Concepts Assignment

Assignment Help Computer Network Security
Reference no: EM132599589 , Length: word count:2000

ITC513 Wireless Networking Concepts - Charles Sturt University

Assessment - Task and Research Project wireless

Task 1: Wireless Channel Capacity Calculation

Task 1(a)  - Wireless communication systems are often modeled under the free-space assumption. As a wireless communication expert, you will be required to find the capacity of a given wireless link. One such link is shown in the following figure, which operates in the 3 GHz frequency band using a bandwidth of 20 MHz. The transmitter is at a distance of 3 km from the receiver. Given that the system uses a transmit power of +30dBm, and the receiver has a noise power of +5dBm, calculate the capacity of this wireless link in bps (bits per second).

Figure for Task 1(a): Wireless link under free-space assumption

Task 1(b)  - Under the same scenario as given in part (a), now assume that an interferer is also present in the surroundings of the receiver, as shown in Figure 1(b). The interferer is at a distance of 5 km from the receiver, and uses a transmit power of +50dBm. Assuming that the interferer's transmission is treated as noise at the receiver, calculate again the capacity of the wireless link in bps (bits per second).

Figure for Task 1(b): Wireless link in presence of Interferer and under free-space assumption

Task 2: Innovative Research Project
A local engineering group has asked you to present your findings of some of the most recent wireless technologies for future communication systems. A list of these potential technologies is given as follows:
• Millimetre Wave (mmWave) Communications
• Enabling Technologies for 6G
• Intelligent Reflecting Surfaces (IRS)
• Unmanned Aerial Vehicles (UAVs) for Wireless Communications
• Ultra-Reliable Low Latency Communication (URLLC) Systems
• Machine Learning for Wireless Communication
• Simultaneous Wireless Information & Power Transfer (SWIPT) Systems
• Industrial Internet-of-Things (IIoT)
• Tera-Hertz Communication systems
• Autonomous vehicles
• Intelligent Transport system
• Emerging wireless technologies and Dark web
• 5G - Trends and Technologies
• Smart Cities

Research these technologies, paying specific attention to one of them. You should consider their applications in future communication systems, strengths and weaknesses, and their security issues among other details. You should also provide an opinion regarding the popularity and adoption of your chosen technology in the near future.

Deliverable: You need to provide a report on your selected wireless communication technology. The report should include Abstract, Introduction, Body of the report that may include sections such as real life applications, advantages and challenges, security issues etc (body of the report vary for each student), conclusion and references. Your report should not be more than four A4 pages long including everything, i.e. from first page to the last page of references. In general, four A4 pages with the font size of 11 may have 2000 words (maximum). You need to provide at least three recent reference articles to your technology of choice.

Attachment:- Task and Research Project wireless.rar

Reference no: EM132599589

Questions Cloud

Make bank reconciliation for move inc at november : Make bank reconciliation for Move, Inc., at November 30. A credit memorandum enclosed with the November bank statement indicated that a noninterest- bearing
Prepare a direct labor budget for Crane Painting Service : Its average cost for direct labor is $32 per hour. Prepare a direct labor budget for Crane and Cullumber‘s Painting Service for June 2020
States and federal government in policy making : What is the relationship between states and the federal government in policy making?
What amount of bad debt expense will jojo company record : 7% of accounts receivable. What amount of bad debt expense will JoJo Company record if Allowance for Doubtful Accounts has a credit balance of 4,000?
ITC513 Wireless Networking Concepts Assignment : ITC513 Wireless Networking Concepts Assignment Help and Solution, Charles Sturt University - Assessment Writing Service
Oklahoma City Bombing and 9/11 terrorist attacks : Discuss the similarities and differences between the Oklahoma City Bombing and 9/11 terrorist attacks.
Research the possible risks that the company might face : The new outlet will be a profitable investment. Research the possible risks that the company might face if this new outlet is opened in China.
Explain the accounting treatment required : Briefly explain the accounting treatment required under appropriate Australian Accounting Standards if they spent money exploring for minerals.
Describe ways that an administrator can harden a system : Describe some ways that an administrator can harden a system on a network. Include references, no copy-paste strictly. use your own words.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Cisco firewall rule case study

Discussion Questions and Mappings to Blooms Taxonomy - What changes would be necessary if the main router did not function as a firewall

  Analyze the security controls measures in given problem

Analyze the security controls measures that are needed to mitigate these vulnerabilities so that organizations will adopt wireless technologies.

  What you would do to secure the new vpn and wireless access

What you would do to secure the new VPN and wireless access to external users to include a recommendation for a strong level of wireless encryption.

  Report on information security planning and policy

Write a research report on information security planning and policy. Based on information security planning and policy around 3000 words.

  Write a function with the name scoretoletter

Write a function 'sumOfThrows' that takes two parameters 'throws' and 'sides'. 'sides' should have a default values of 6.

  Review problem on infrastructure and security

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate.

  Discuss about the cyber security and risk management

Read Four (4) academically reviewed articles on Cyber Security and Risk Management and complete the following activities: Wikipedia articles will not be accept

  How to manage the file system encryption keys

Setup a 64MB encrypted file system in a file on a Flash drive so that it can be used with the cryptmount command.

  Analyze a well-designed risk management plan

Analyze a well-designed risk management plan to determine how it can prevent risk and control residual risk. Identify what you believe to be the most important step in the risk management process and explain why.

  Research at least two successful cyber attacks

Research at least two successful cyber attacks that occurred in recent years. Describe the details of the event. What was compromised?

  Application you are a network administrator in net ambit

you are a network administrator in net ambit inc. the company has one external ip five servers static. one of them

  CIS114-6 Network Systems and Administration Assignment

CIS114-6 Network Systems and Administration Assignment Help and Solution, Majan University College - University of Bedfordshire - Assessment Writing Service

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd