Bn303
Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assessment Details and Submission Guidelines Trimester Term 1 2021 Unit Code BN303 Unit Title Wireless Network & Security Assessment Type Individual Assessment Assessment Title Analysis of Future Wireless Technologies Purpose of the assessment (with ULO Mapping) b. Utilise standards-based technologies used in various networks; c. Test and compare the performance of various wireless networks; Weight 20% Total Marks 20 Word limit 1500 minimum Due Dates Part A (7%) Week 3 11th of April 2021 11:55 PM Part B (13%) Week 7 6th of May 2021 11:55 PM Submission Guideline s All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11- pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings. Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension If an extension of time to submit work is required, a Special Consideration Application must be submitted directly through AMS. You must submit this application within three working days of the assessment due date. Further information is available at: http://www.mit.edu.au/about-mit/institute- publications/policies- procedures- and- guidelines/specialconsiderationdeferment Academic Miscondu ct Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute- publications/policies- procedures-and-guidelines/Plagiarism- Academic-Misconduct- Policy-Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about-mit/institute-publications/policies- http://www.mit.edu.au/about-mit/institute-publications/policies- http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Assignment Description You are a new Network Engineering at Woolworth Fashion Australia Pty Ltd. Your task is to extend the computing network coverage for the staff and visitors at the Fashion Hub located at the Canberra CBD. The staff has long been asking for mobile communications and wireless connections so that they can move around with their laptops and connect to the business through mobile phones. The problem was security. As the fashion designers share their new design ideas, it was a risk to consider using wireless communication mainly due to potential attackers who may attempt to steal the new fashion design ideas. In addition, there will be many shelves with clothes on – and a few partitions (in place of walls) that can block out some wireless signals. The existing shop is approximately 50 meters by 20 meters, and the newly extended part will be 50 meters by 10 meters (right adjacent to the existing hub space). [Assignment 1 Part A] Report the advantages and challenges of wireless communication technologies in consideration of convenience, mobility, multipath signal interferences, signal dispersion, and security issues. You may consider the above case example to consider ‘security concerns by leaking a new fashion design’. How can such a security breach occur in a wireless environment (is there a known example?). If you are making references to any external resources (including websites), please provide a reference list. [Assignment 1 Part B] Your task is to select at least two of the following wireless technologies in relevance to the case scenario above: ZigBee WiMax Bluetooth RFID WLAN IoT 5G Then you will report on: 1. Introduction to the selected technologies 2. Use case example(s) of the selected technologies 3. Technical backgrounds on the selected technologies 4. Potential benefits of the selected wireless technologies to the business 5. Security concerns or resolutions of the selected wireless technologies 6. Final recommendations to the business clients (less than 100 words) Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Marking Guide: Marks are allocated as indicated on each question, taking the following aspects into account: Criteria Description Marks Assignment 1 Part A Brief discussion of wireless technologies Discuss the advantages and disadvantages of the wireless technologies in comparison to wired technologies 7 Assignment Part B: Section 1- introduction and case examples Introduction to wireless technologies and their pros and cons. Use of case examples to motivate the business director. 3 Assignment Part B: Section 2 – operational mechanisms Describe on how the selected wireless technologies operate – in particular for the aforementioned business environment (and their potential benefits) 5 Assignment Part B: Section 3 – Security vulnerabilities and resolutions Describe the known and unknown security vulnerabilities and your recommended resolutions. If available, some evidence of security testing. 3 Assignment Part B: Report structure Inadequate structure, careless presentation, poor writing , word limits 1 Assignment Part B: Reference style (IEEE) Minimum 5 Proper different referencing resources 1 Prepared by: A/Prof Tony Jan Moderated by: Dr Sanjeeb Shrestha March 2021 Marking Rubric for Exercise Answers Grade Mark HD 80% + D 70%- 79% CR 60%- 69% P 50%- 59% Fail< 50% excellent very good good satisfactory unsatisfactor y assignment 1 part a explanation is clear and easy to follow with strong arguments mostly consisten t and convincin g brief consistency adequate argument is discussion of logical and cohesion and confused and wireless convincing conviction disjointed technologies /7 assignmen t part b: section 1- introductio n and case examples explanation is clear and easy to follow with strong arguments consistency logical and convincing mostly consisten t and convincin g adequate cohesion and conviction argument is confused and disjointed prepared by: a/prof tony jan moderated by: dr sanjeeb shrestha march 2021 /3 assignment part b: the presented solution the presented solution the presented solution demonstrated an average degree of details on wireless technology operations. the presented solution the presented solution demonstrated an demonstrated a demonstrated a demonstrated a section 2 – operational mechanism s extreme degree of details on wireless high degree of details on wireless low degree of details on wireless poor degree of details on wireless technology technology technology technology /5 operations. operations. operations. operations. assignment part b: section 3 – security vulnerabilitie s and resolutions /3 the presented solution demonstrated an extreme degree of details on wireless technology security concerns. the presented solution demonstrated a high degree of details on wireless technology security concerns. the presented solution demonstrated an average degree of details on wireless technology security concerns. the presented solution demonstrate d a low of details on wireless technology security concerns. the presented solution demonstrated a poor degree of details on wireless technology security concerns. assignment part b: proper writing. professionall y presented properly written, with some minor deficiencies mostly good, acceptable presentation poor structure, careless presentation report structur e but some structure or presentation /1 problems assignment part b: referenc e style (ieee) clear styles with excellent source of references. clear referencing/ style generally good referencing/st yle unclear referencing/st yle lacks consistency with many errors /1 50%="" excellent="" very="" good="" good="" satisfactory="" unsatisfactor="" y="" assignment="" 1="" part="" a="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" mostly="" consisten="" t="" and="" convincin="" g="" brief="" consistency="" adequate="" argument="" is="" discussion="" of="" logical="" and="" cohesion="" and="" confused="" and="" wireless="" convincing="" conviction="" disjointed="" technologies="" 7="" assignmen="" t="" part="" b:="" section="" 1-="" introductio="" n="" and="" case="" examples="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consisten="" t="" and="" convincin="" g="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" prepared="" by:="" a/prof="" tony="" jan="" moderated="" by:="" dr="" sanjeeb="" shrestha="" march="" 2021="" 3="" assignment="" part="" b:="" the="" presented="" solution="" the="" presented="" solution="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" operations.="" the="" presented="" solution="" the="" presented="" solution="" demonstrated="" an="" demonstrated="" a="" demonstrated="" a="" demonstrated="" a="" section="" 2="" –="" operational="" mechanism="" s="" extreme="" degree="" of="" details="" on="" wireless="" high="" degree="" of="" details="" on="" wireless="" low="" degree="" of="" details="" on="" wireless="" poor="" degree="" of="" details="" on="" wireless="" technology="" technology="" technology="" technology="" 5="" operations.="" operations.="" operations.="" operations.="" assignment="" part="" b:="" section="" 3="" –="" security="" vulnerabilitie="" s="" and="" resolutions="" 3="" the="" presented="" solution="" demonstrated="" an="" extreme="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" high="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" an="" average="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrate="" d="" a="" low="" of="" details="" on="" wireless="" technology="" security="" concerns.="" the="" presented="" solution="" demonstrated="" a="" poor="" degree="" of="" details="" on="" wireless="" technology="" security="" concerns.="" assignment="" part="" b:="" proper="" writing.="" professionall="" y="" presented="" properly="" written,="" with="" some="" minor="" deficiencies="" mostly="" good,="" acceptable="" presentation="" poor="" structure,="" careless="" presentation="" report="" structur="" e="" but="" some="" structure="" or="" presentation="" 1="" problems="" assignment="" part="" b:="" referenc="" e="" style="" (ieee)="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing/="" style="" generally="" good="" referencing/st="" yle="" unclear="" referencing/st="" yle="" lacks="" consistency="" with="" many="" errors=""> 50% excellent very good good satisfactory unsatisfactor y assignment 1 part a explanation is clear and easy to follow with strong arguments mostly consisten t and convincin g brief consistency adequate argument is discussion of logical and cohesion and confused and wireless convincing conviction disjointed technologies /7 assignmen t part b: section 1- introductio n and case examples explanation is clear and easy to follow with strong arguments consistency logical and convincing mostly consisten t and convincin g adequate cohesion and conviction argument is confused and disjointed prepared by: a/prof tony jan moderated by: dr sanjeeb shrestha march 2021 /3 assignment part b: the presented solution the presented solution the presented solution demonstrated an average degree of details on wireless technology operations. the presented solution the presented solution demonstrated an demonstrated a demonstrated a demonstrated a section 2 – operational mechanism s extreme degree of details on wireless high degree of details on wireless low degree of details on wireless poor degree of details on wireless technology technology technology technology /5 operations. operations. operations. operations. assignment part b: section 3 – security vulnerabilitie s and resolutions /3 the presented solution demonstrated an extreme degree of details on wireless technology security concerns. the presented solution demonstrated a high degree of details on wireless technology security concerns. the presented solution demonstrated an average degree of details on wireless technology security concerns. the presented solution demonstrate d a low of details on wireless technology security concerns. the presented solution demonstrated a poor degree of details on wireless technology security concerns. assignment part b: proper writing. professionall y presented properly written, with some minor deficiencies mostly good, acceptable presentation poor structure, careless presentation report structur e but some structure or presentation /1 problems assignment part b: referenc e style (ieee) clear styles with excellent source of references. clear referencing/ style generally good referencing/st yle unclear referencing/st yle lacks consistency with many errors /1>