ITC513 Wireless Networking Concepts Assignment

Assignment Help Computer Network Security
Reference no: EM132599589 , Length: word count:2000

ITC513 Wireless Networking Concepts - Charles Sturt University

Assessment - Task and Research Project wireless

Task 1: Wireless Channel Capacity Calculation

Task 1(a)  - Wireless communication systems are often modeled under the free-space assumption. As a wireless communication expert, you will be required to find the capacity of a given wireless link. One such link is shown in the following figure, which operates in the 3 GHz frequency band using a bandwidth of 20 MHz. The transmitter is at a distance of 3 km from the receiver. Given that the system uses a transmit power of +30dBm, and the receiver has a noise power of +5dBm, calculate the capacity of this wireless link in bps (bits per second).

Figure for Task 1(a): Wireless link under free-space assumption

Task 1(b)  - Under the same scenario as given in part (a), now assume that an interferer is also present in the surroundings of the receiver, as shown in Figure 1(b). The interferer is at a distance of 5 km from the receiver, and uses a transmit power of +50dBm. Assuming that the interferer's transmission is treated as noise at the receiver, calculate again the capacity of the wireless link in bps (bits per second).

Figure for Task 1(b): Wireless link in presence of Interferer and under free-space assumption

Task 2: Innovative Research Project
A local engineering group has asked you to present your findings of some of the most recent wireless technologies for future communication systems. A list of these potential technologies is given as follows:
• Millimetre Wave (mmWave) Communications
• Enabling Technologies for 6G
• Intelligent Reflecting Surfaces (IRS)
• Unmanned Aerial Vehicles (UAVs) for Wireless Communications
• Ultra-Reliable Low Latency Communication (URLLC) Systems
• Machine Learning for Wireless Communication
• Simultaneous Wireless Information & Power Transfer (SWIPT) Systems
• Industrial Internet-of-Things (IIoT)
• Tera-Hertz Communication systems
• Autonomous vehicles
• Intelligent Transport system
• Emerging wireless technologies and Dark web
• 5G - Trends and Technologies
• Smart Cities

Research these technologies, paying specific attention to one of them. You should consider their applications in future communication systems, strengths and weaknesses, and their security issues among other details. You should also provide an opinion regarding the popularity and adoption of your chosen technology in the near future.

Deliverable: You need to provide a report on your selected wireless communication technology. The report should include Abstract, Introduction, Body of the report that may include sections such as real life applications, advantages and challenges, security issues etc (body of the report vary for each student), conclusion and references. Your report should not be more than four A4 pages long including everything, i.e. from first page to the last page of references. In general, four A4 pages with the font size of 11 may have 2000 words (maximum). You need to provide at least three recent reference articles to your technology of choice.

Attachment:- Task and Research Project wireless.rar

Reference no: EM132599589

Questions Cloud

Make bank reconciliation for move inc at november : Make bank reconciliation for Move, Inc., at November 30. A credit memorandum enclosed with the November bank statement indicated that a noninterest- bearing
Prepare a direct labor budget for Crane Painting Service : Its average cost for direct labor is $32 per hour. Prepare a direct labor budget for Crane and Cullumber‘s Painting Service for June 2020
States and federal government in policy making : What is the relationship between states and the federal government in policy making?
What amount of bad debt expense will jojo company record : 7% of accounts receivable. What amount of bad debt expense will JoJo Company record if Allowance for Doubtful Accounts has a credit balance of 4,000?
ITC513 Wireless Networking Concepts Assignment : ITC513 Wireless Networking Concepts Assignment Help and Solution, Charles Sturt University - Assessment Writing Service
Oklahoma City Bombing and 9/11 terrorist attacks : Discuss the similarities and differences between the Oklahoma City Bombing and 9/11 terrorist attacks.
Research the possible risks that the company might face : The new outlet will be a profitable investment. Research the possible risks that the company might face if this new outlet is opened in China.
Explain the accounting treatment required : Briefly explain the accounting treatment required under appropriate Australian Accounting Standards if they spent money exploring for minerals.
Describe ways that an administrator can harden a system : Describe some ways that an administrator can harden a system on a network. Include references, no copy-paste strictly. use your own words.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd