Microsoft Word - BN303 Assignment 1.docx Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb Shrestha March 2022 Assessment Details and Submission Guidelines Trimester Term 1 2022 Unit Code BN303...

1 answer below »
I didnot understand the question


Microsoft Word - BN303 Assignment 1.docx Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb Shrestha March 2022     Assessment Details and Submission Guidelines Trimester Term 1 2022 Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual Assessment Assessment Title Analysis of Wireless Technologies Purpose of the assessment (with ULO Mapping) a. Explain wireless communication protocols; b. Utilise standards-based technologies used in various networks; Weight 5 % Total Marks 20 Word limit 1500 minimum Due Dates Week 3, 10th April 2022, 11:55 PM   Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11- pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at:  http://www.mit.edu.au/about-mit/institute- publications/policies-procedures- and- guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies-procedures-and- guidelines/Plagiarism- Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb Shrestha March 2022     Assignment Description You are a new Network Engineering at Chadstone - The Fashion Capital. Your task is to extend the computing network coverage for the staff and visitors at the Chadstone shopping center located at Victoria, Melbourne. You can select one business of your choice in the food industry that are operating at Chadstone https://www.chadstone.com.au/ Example: You can select McDonalds, KFC, Oporto etc. The owner of the business has long been asking for mobile communications and wireless connections so that they can move around with their laptops and connect to the business through mobile phones. The problem was security. As the franchise owner want to share their new food recipe (for their existing business and/or to buy another franchise), it was a risk to consider using wireless communication mainly due to potential attackers who may attempt to steal the new recipe. In addition, there will be many shelves with food stock on – and a few partitions (in place of walls) that can block out some wireless signals. The existing shop is approximately 25 meters by 25 meters, and the newly extended part will be 25 meters by 10 meters (right adjacent to the existing hub space). Assignment 1 Report the advantages and challenges of wireless communication technologies in consideration of convenience, mobility, multipath signal interferences, signal dispersion, and security issues. You may consider the above case example to consider ‘security concerns by leaking a new food recipe. How can such a security breach occur in a wireless environment (is there a known example?). If you are making references to any external resources (including websites), please provide a reference list. Your task is to select at least two of the following wireless technologies in relevance to the case scenario above:  ZigBee  WiMax  Bluetooth  RFID  WLAN  IoT  5G Then you will report on: 1. Introduction to the selected technologies 2. Use case example(s) of the selected technologies 3. Technical backgrounds on the selected technologies 4. Potential benefits of the selected wireless technologies to the business 5. Security concerns or resolutions of the selected wireless technologies 6. Final recommendations to the business clients (less than 100 words) Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb Shrestha March 2022     Marking Guide: Marks are allocated as indicated on each question, taking the following aspects into account: Criteria Description Marks Section 1 Brief discussion of wireless technologies Discuss the advantages and disadvantages of the wireless technologies in comparison to wired technologies 7 Section 2 introduction and case examples Introduction to wireless technologies and their pros and cons. Use of case examples to motivate the business director. 3 Section 3 Operational mechanisms Describe on how the selected wireless technologies operate – in particular for the aforementioned business environment (and their potential benefits) 5 Section 4 Security vulnerabilities and resolutions Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing. 3 Report structure Inadequate structure, careless presentation, poor writing, word limits 1 Reference style (IEEE) Minimum 5 Proper different referencing resources 1 Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb Shrestha March 2022     Marking Rubric for Exercise Answers Grade HD D CR P Fail Mark 80% 70%- 60%- 50%- < + 79% 69% 59% 50%     excellent very good good satisfactory unsatisfactory assignment 1 section 1 brief discussion of wireless technologies /7 explanation is clear and easy to follow with strong arguments consistenc y logical and convincing mostly consistent and convincing adequate cohesion and conviction argument is confused and disjointed section 2 introduction and case examples  /3 explanation is clear and easy to follow with strong arguments  consistency logical and convincing  mostly consistent and convincing  adequate cohesion and conviction  argument is confused and disjointed  prepared by: dr touseef rana moderated by: dr sanjeeb shrestha march 2022     assignment section - 3 operational mechanisms /5 the presented solution demonstrated an extreme degree of details on wireless technology operations. the presented solution demonstrated a high degree of details on wireless technology operations. the presented solution demonstrated an average degree of details on wireless technology operations. the presented solution demonstrated a low degree of details on wireless technology operations. the presented solution demonstrated a poor degree of details on wireless technology operations. assignment section 4 security vulnerabilities and resolutions /3 the presented solution demonstrated an extreme degree of details on wireless technology security concerns. the presented solution demonstrated a high degree of details on wireless technology security concerns. the presented solution demonstrated an average degree of details on wireless technology security concerns. the presented solution demonstrate d a low of details on wireless technology security concerns. the presented solution demonstrated a poor degree of details on wireless technology security concerns. assignment report structure /1 proper writing. professionally presented properly written, with some minor deficiencies mostly good, but some structure or presentation problems acceptable presentation poor structure, careless presentation assignment reference style (ieee) /1 clear styles with excellent source of references. clear referencing/ style generally good referencing/style unclear referencing/style lacks consistency with many errors +="" 79%="" 69%="" 59%="" 50%=""    ="" excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" assignment="" 1="" section="" 1="" brief="" discussion="" of="" wireless="" technologies="" 7="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistenc="" y="" logical="" and="" convincing="" mostly="" consistent="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" section="" 2="" introduction="" and="" case="" examples ="" 3="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments ="" consistency="" logical="" and="" convincing ="" mostly="" consistent="" and="" convincing ="" adequate="" cohesion="" and="" conviction ="" argument="" is="" confused="" and="" disjointed ="" prepared="" by:="" dr="" touseef="" rana="" moderated="" by:="" dr="" sanjeeb="" shrestha="" march="" 2022=""  =""  ="" assignment="" section="" -="" 3="" operational="" mechanisms="" 5="" the="" presented="" solution="" demonstrated="" an="" extreme="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" demonstrated="" a="" high="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" demonstrated="" a="" low="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" demonstrated="" a="" poor="" degree="" of="" details="" on="" wireless="" technology="" operations.="" assignment="" section="" 4="" security="" vulnerabilities="" and="" resolutions="" 3="" the="" presented="" solution="" demonstrated="" an="" extreme="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" high="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrate="" d="" a="" low="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" poor="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" assignment="" report="" structure="" 1="" proper="" writing.="" professionally="" presented="" properly="" written,="" with="" some="" minor="" deficiencies="" mostly="" good,="" but="" some="" structure="" or="" presentation="" problems="" acceptable="" presentation="" poor="" structure,="" careless="" presentation="" assignment="" reference="" style="" (ieee)="" 1="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/style="" unclear="" referencing/style="" lacks="" consistency="" with="" many="">
Answered 2 days AfterMar 26, 2022

Answer To: Microsoft Word - BN303 Assignment 1.docx Prepared by: Dr Touseef RANA Moderated by: Dr Sanjeeb...

Insha answered on Mar 28 2022
114 Votes
UNIT CODE: BN303
UNIT TITLE: WIRELESS NETWORK & SECURITY
ASSESSMENT TITLE: ANALYSIS OF WIRELESS TECHNOLOGIES
Table of Contents
Introduction    3
1. Introduction to the Selected Technology    3
WLAN    3
IoT    3
2. Case Example Related to McDonalds    3
McDonalds and WLAN    3
McDonalds and IoT    3
3. Technical Backgrounds    4
WLAN    4
IoT    4
4. Potential Benefits to McDonalds    5
WLAN to McDonalds    5
IoT to Mc
Donalds    5
5. Security Concerns or Resolutions    5
6. Recommendations to McDonalds    5
Conclusion    6
Bibliography    7
Introduction
This study will examine and report on the upsides and downsides of wireless communication technologies in terms of convenience, mobility, multipath signal interferences, signal dispersion and security concerns, using the case scenario of a new culinary recipe being leaked. We will also go through the potential commercial benefits of the chosen wireless technology, as well as any security problems or remedies.
1. Introduction to the Selected Technology
WLAN
“A wireless LAN (WLAN) is a computer network that uses wireless communication to connect two or more devices to establish a local area network (LAN). “This allows users to move about the area while remaining connected to the network. A WLAN can also enable access to the rest of the Internet through a gateway. The most extensively used computer networks are wireless LANs based on IEEE 802.11 specifications. These are frequently referred to as Wi-Fi, which is a Wi-Fi Alliance trademark. They are utilised in home and small business networks to connect laptop computers, printers, cell phones, Web TVs and gaming gadgets to the internet through a wireless router.” [1]
IoT
The Internet of Things (IoT) refers to physical items that include sensors, computing power, software and other technologies and may connect to the Internet and share data. IoT technology is most closely associated with items related to the notion of the "smart home" in the consumer market. There are several worries regarding the hazards associated with the expansion of IoT technology and goods, particularly in the areas of security and privacy. These problems have begun to be addressed by the private sector and the government.
2. Case Example Related to McDonalds
McDonalds and WLAN
With an Extra Value Meal, 10 McDonald's locations in the New York region are giving one hour of free wireless Internet access. AT&T, IBM and Intel created Cometa Networks, a wireless LAN hot spot firm, in December. By the end of the year, the fast food behemoth aims to expand the test programme to 300 locations in three cities. "In a highly public area, it's really a true delivery on the promise of Wi-Fi [802.11b wireless LAN] technology." [2] Customers will receive one hour free with the purchase of an Extra Value meal for the time being, with each extra hour costing $3.00. If the pilot goes well, the price strategy may alter, according to Korey. Customers who wish to utilise public WLANs must have an 802.11b-capable notebook computer. T-Mobile USA Inc. has confirmed that its network is Centrino-compatible. The phrase "Making mobility a reality with McDonalds and Cometa" appears on brochure advertising the McDonalds service features, which also provides a link to Intel's website [3].
McDonalds and IoT
Sensors are used to monitor the operations of McDonald's, which has 12 outlets in Manhattan and Brooklyn. Sensors detect the presence of water in the walk-in cooler and the electrical closet, as well as if the door has been left open for more than five minutes [4]. If temperature, humidity, or water presence measurements are above or below criteria, an alarm will sound. Instead than focusing on servicing customers, managers were expected to spend time monitoring equipment. Bridge well’s kitchen features a cutting-edge sensor system that monitors the walk-in cooler, prep lines, grab-and-go coolers and electrical closet in real time. Throughout the kitchen, wireless sensors monitor temperature, humidity, water presence and door...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here