Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester Term 1 2021 Unit Code BN303 Unit Title Wireless Network & Security...

1 answer below »
Bn303


Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester Term 1 2021 Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual Assessment Assessment Title Analysis of Future Wireless Technologies Purpose of the assessment (with ULO Mapping) b. Utilise standards-based technologies used in various networks; c. Test and compare the performance of various wireless networks; Weight 20% Total Marks 20 Word limit 1500 minimum Due Dates Part A (7%) Week 3 11th of April 2021 11:55 PM Part B (13%) Week 7 6th of May 2021 11:55 PM Submission Guideline s  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11- pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at:  http://www.mit.edu.au/about-mit/institute- publications/policies- procedures- and- guidelines/specialconsiderationdeferment Academic Miscondu ct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies- procedures-and-guidelines/Plagiarism- Academic-Misconduct- Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about-mit/institute-publications/policies- http://www.mit.edu.au/about-mit/institute-publications/policies- http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assignment Description You are a new Network Engineering at Woolworth Fashion Australia Pty Ltd. Your task is to extend the computing network coverage for the staff and visitors at the Fashion Hub located at the Canberra CBD. The staff has long been asking for mobile communications and wireless connections so that they can move around with their laptops and connect to the business through mobile phones. The problem was security. As the fashion designers share their new design ideas, it was a risk to consider using wireless communication mainly due to potential attackers who may attempt to steal the new fashion design ideas. In addition, there will be many shelves with clothes on – and a few partitions (in place of walls) that can block out some wireless signals. The existing shop is approximately 50 meters by 20 meters, and the newly extended part will be 50 meters by 10 meters (right adjacent to the existing hub space). [Assignment 1 Part A] Report the advantages and challenges of wireless communication technologies in consideration of convenience, mobility, multipath signal interferences, signal dispersion, and security issues. You may consider the above case example to consider ‘security concerns by leaking a new fashion design’. How can such a security breach occur in a wireless environment (is there a known example?). If you are making references to any external resources (including websites), please provide a reference list. [Assignment 1 Part B] Your task is to select at least two of the following wireless technologies in relevance to the case scenario above:  ZigBee  WiMax  Bluetooth  RFID  WLAN  IoT  5G Then you will report on: 1. Introduction to the selected technologies 2. Use case example(s) of the selected technologies 3. Technical backgrounds on the selected technologies 4. Potential benefits of the selected wireless technologies to the business 5. Security concerns or resolutions of the selected wireless technologies 6. Final recommendations to the business clients (less than 100 words) Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Marking Guide: Marks are allocated as indicated on each question, taking the following aspects into account: Criteria Description Marks Assignment 1 Part A Brief discussion of wireless technologies Discuss the advantages and disadvantages of the wireless technologies in comparison to wired technologies 7 Assignment Part B: Section 1- introduction and case examples Introduction to wireless technologies and their pros and cons. Use of case examples to motivate the business director. 3 Assignment Part B: Section 2 – operational mechanisms Describe on how the selected wireless technologies operate – in particular for the aforementioned business environment (and their potential benefits) 5 Assignment Part B: Section 3 – Security vulnerabilities and resolutions Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing. 3 Assignment Part B: Report structure Inadequate structure, careless presentation, poor writing , word limits 1 Assignment Part B: Reference style (IEEE) Minimum 5 Proper different referencing resources 1 Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Marking Rubric for Exercise Answers Grade Mark HD 80% + D 70%- 79% CR 60%- 69% P 50%- 59% Fail< 50% excellent very good good satisfactory unsatisfactor y assignment 1 part a explanation is clear and easy to follow with strong arguments mostly consisten t and convincin g brief consistency adequate argument is discussion of logical and cohesion and confused and wireless convincing conviction disjointed technologies /7 assignmen t part b: section 1- introductio n and case examples explanation is clear and easy to follow with strong arguments consistency logical and convincing mostly consisten t and convincin g adequate cohesion and conviction argument is confused and disjointed prepared by: a/prof tony jan moderated by: dr sanjeeb shrestha march 2021 /3 assignment part b: the presented solution the presented solution the presented solution demonstrated an average degree of details on wireless technology operations. the presented solution the presented solution demonstrated an demonstrated a demonstrated a demonstrated a section 2 – operational mechanism s extreme degree of details on wireless high degree of details on wireless low degree of details on wireless poor degree of details on wireless technology technology technology technology /5 operations. operations. operations. operations. assignment part b: section 3 – security vulnerabilitie s and resolutions /3 the presented solution demonstrated an extreme degree of details on wireless technology security concerns. the presented solution demonstrated a high degree of details on wireless technology security concerns. the presented solution demonstrated an average degree of details on wireless technology security concerns. the presented solution demonstrate d a low of details on wireless technology security concerns. the presented solution demonstrated a poor degree of details on wireless technology security concerns. assignment part b: proper writing. professionall y presented properly written, with some minor deficiencies mostly good, acceptable presentation poor structure, careless presentation report structur e but some structure or presentation /1 problems assignment part b: referenc e style (ieee) clear styles with excellent source of references. clear referencing/ style generally good referencing/st yle unclear referencing/st yle lacks consistency with many errors /1 50%="" excellent="" very="" good="" good="" satisfactory="" unsatisfactor="" y="" assignment="" 1="" part="" a="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" mostly="" consisten="" t="" and="" convincin="" g="" brief="" consistency="" adequate="" argument="" is="" discussion="" of="" logical="" and="" cohesion="" and="" confused="" and="" wireless="" convincing="" conviction="" disjointed="" technologies="" 7="" assignmen="" t="" part="" b:="" section="" 1-="" introductio="" n="" and="" case="" examples="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consisten="" t="" and="" convincin="" g="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" prepared="" by:="" a/prof="" tony="" jan="" moderated="" by:="" dr="" sanjeeb="" shrestha="" march="" 2021="" 3="" assignment="" part="" b:="" the="" presented="" solution="" the="" presented="" solution="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" the="" presented="" solution="" demonstrated="" an="" demonstrated="" a="" demonstrated="" a="" demonstrated="" a="" section="" 2="" –="" operational="" mechanism="" s="" extreme="" degree="" of="" details="" on="" wireless="" high="" degree="" of="" details="" on="" wireless="" low="" degree="" of="" details="" on="" wireless="" poor="" degree="" of="" details="" on="" wireless="" technology="" technology="" technology="" technology="" 5="" operations.="" operations.="" operations.="" operations.="" assignment="" part="" b:="" section="" 3="" –="" security="" vulnerabilitie="" s="" and="" resolutions="" 3="" the="" presented="" solution="" demonstrated="" an="" extreme="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" high="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrate="" d="" a="" low="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" poor="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" assignment="" part="" b:="" proper="" writing.="" professionall="" y="" presented="" properly="" written,="" with="" some="" minor="" deficiencies="" mostly="" good,="" acceptable="" presentation="" poor="" structure,="" careless="" presentation="" report="" structur="" e="" but="" some="" structure="" or="" presentation="" 1="" problems="" assignment="" part="" b:="" referenc="" e="" style="" (ieee)="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/st="" yle="" unclear="" referencing/st="" yle="" lacks="" consistency="" with="" many="" errors="">
Answered 2 days AfterJul 24, 2021BN303

Answer To: Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assessment Details and...

Neha answered on Jul 27 2021
155 Votes
88508 - wireless networks/part A.docx
Wireless Communication
The wireless can be defined as the communication without having any usage of wires. To transfer the information which can be either data or the voice with the help of wireless communication we will require antenna. The antenna will be the device which has the efficiency of
coupling RF energy from one medium to another medium. For this we will need receiver and transmitter so that we can have complete end to end wireless link. The wireless communication uses electromagnetic waves as the medium to carry the information between receiver and transmitted through any channel.
Advantages of Wireless Communication
With the help of wireless communication, we can achieve following advantages.
· The wireless frequency is able to penetrate through the world and the wireless networks become easy for installation anywhere on the basis of requirement and the choice will stop this help us to achieve the flexibility and it becomes the great benefit of having wireless network in which we do not have to install the wire cable.
· We can have easy installation for the wireless networks, and it is much easier to maintain as compared wired cable. It helps us through grow the network as per requirements and can have hundred to thousands of the customer in future.
· The wireless network makes it easier to plan for the organization as compared with the wired network because in wireless software configuration for the power, frequency, or any other parameters.
· With the help of wireless communication network, we can easily connect with the remote areas which are not inaccessible like behind the walls, hilly terrains, or buildings.
· Wireless communication allows to achieve benefit of mobility, but it is not possible in wired communication.
· The end devices used for wireless communication are much cheaper.
Disadvantages of Wireless Communication
Following are the disadvantages of Wireless Communication:
· It is easier for the attackers to hack wireless signals and it affects the privacy. We can use security algorithms like AES, WAP2, WEP and few others and few of the modulation techniques like DSSS or FHSS.
· In the initial days the network was much slower with wireless environment but now we have advanced standard like IEEE 802.11 and 802.11ad which are available with LAN, and they provide same performance as provided by ethernet based LAN.
· The wireless networks need some careful radio frequency planning during initial stage of installation.
· The communication in wireless network is also subject to interference. There are different receiver and modulation techniques which can be used to make the system robust against interference.
The most common types of wireless network threats are:
· Denial of service: In this attack it sends large amount of the traffic or viruses on the network so that it can hijack resources or introduce backdoors.
· Configuration problems: In this the user may have incomplete configurations or the misconfigurations.
· Rogue access points: In this attack the attacker can fool devices and connect them with the false access point.
· Passive Capturing: Eavesdropping can be done in the range of access point for capturing sensitive information.
· Freeloading: In this threat the attackers can perform piggybacking on the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here