Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless...

1 answer below »
this should be make according to marking criteria and no plagiarism.


Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa March, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Individual Assignment 1 Assessment Title Evaluation of Wireless Communication technologies and wireless communication standards for Cyber-Physical Systems and the Internet of Things Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to compare the wireless communication technologies and evaluate the wireless communication standards for Cyber- Physical Systems and Internet of Things. Students will be able to complete the following ULOs: b. Compare standards-based technologies used in various networks; c. Test and evaluate various wireless networks performance; Weight 10% Total Marks 70 Word limit 1500 – 2000 words Due Date 1/5/2018 11:55PM Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure MN603 Wireless Networks and Security Page#2 of 4 Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa March, 2018 Assignment Description Wireless sensors and actuators connected by the Internet of Things (IoT) are central to the design of cyber-physical systems. Such systems require meeting strict requirements of throughput, latency and range, while maintaining low energy consumption and providing high levels of security. Wireless communication technologies provide a platform for the foundation of such systems. Understanding of the wireless communication principles and the wireless communication standards for cyber physical systems and internet of things is essential for the design of such systems. For further reading, could refer to the article “Wireless Communication and Security Issues for Cyber– Physical Systems and the Internet-of-Things” [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library. The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things. The students are required to submit a report, which includes: 1. Comparison of wireless communication technologies in terms of: a. Communication spectrum b. modulation techniques c. medium access control mechanism d. network topologies 2. Evaluate wireless communication standards for cyber physical systems and internet of things including: a. UHF RFID and NFC b. ZigBee, Z-Wave c. Bluetooth and Bluetooth Low Energy d. Cellular Systems e. IEEE 802.11P f. Low-Power Wide Area Networks 3. Wireless Network Performance Based on your evaluation of wireless communication standards for cyber physical systems and internet of things, identify the standard which provides the best network performance. Justify your selection. References [1] A. Burg, A. Chattopadhyay and K. Y. Lam, "Wireless Communication and Security Issues for Cyber–Physical Systems and the Internet-of-Things," in Proceedings of the IEEE, vol. 106, no. 1, pp. 38-60, Jan. 2018. MN603 Wireless Networks and Security Page#3 of 4 Prepared by: Dr Javed Ali Baloch Moderated by: A/Prof Savitri Bevinakoppa March, 2018 Marking criteria: Section to be included in the report Description of the section Marks Introduction Outline of the report ( in 3-4 sentences) 5 Report Layout Report layout, style and language 5 Comparison of wireless communication technologies Comparison of wireless communication technologies in terms of: a. Communication spectrum b. Modulation techniques c. Medium access control mechanism d. Network topologies 20 Evaluation of wireless communication standards for cyber physical systems and internet of things Evaluate wireless communication standards for cyber physical systems and internet of things including: a. UHF RFID and NFC b. ZigBee, Z-Wave c. Bluetooth and Bluetooth Low Energy d. Cellular Systems e. IEEE 802.11P f. Low-Power Wide Area Networks 30 Wireless Network performance Based on your evaluation of wireless communication standards for cyber physical systems and internet of things, identify the standard which provides the best network performance. Justify your selection. 5 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 75 Marking Rubric for Assignment #1: Total Marks 75 Grade Mark HD 56-70 DI 49-55 CR 42-48 P 35-41 Fail<35 excellent very good good satisfactory unsatisfactory introduction /5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. comparison of wireless communication technologies /20 finding is clearly linked and well justified finding is clearly linked and justified finding is linked and convincing finding is not linked and unjustified finding is not available mn603 wireless networks and security page#4 of 4 prepared by: dr javed ali baloch moderated by: a/prof savitri bevinakoppa march, 2018 evaluation of wireless communication standards for cyber physical systems and internet of things /30 exceptional evaluation of wireless communication standards for cyber physical systems and iot including all described standards good evaluation of wireless communicat ion standards for cyber physical systems and iot including all described standards evaluation of wireless communication standards for cyber physical systems and iot including all described standards evaluation of a few wireless communication standards for cyber physical systems and iot unable to evaluate wireless communication standards for cyber physical systems and iot wireless network performance /5 identified the wireless communication standard and provided excellent justification identified the wireless communicat ion standard and provided good justification identified the wireless communication standard and provided valid justification identified the wireless communication standard and failed to provide valid justification failed, to identify the wireless communication standard and provide justification conclusion /5 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed reference style /5 clear styles with excellent source of references. clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors prepared by: dr shaleeza sohail moderated by: dr nandini sidnal march, 2018 assessment details and submission guidelines trimester t1 - 2018 unit code mn504 unit title networked application management assessment type individual assignment assessment title critical analysis and problem solving in networked application management purpose of the assessment (with ulo mapping) the purpose of this assignment is to develop skills of analysing critically, and problem solving in regard to networked application management (nam). students will be able to complete the following ulos: b. apply socio-technical contexts in modern network applications and management; c. utilise common and emerging types of middleware to design and manage networked applications; weight 10% total marks 50 word limit 1500 - 2000 due date 04/05/2018 11:55pm (friday week 7) submission guidelines  all work must be submitted on moodle by the due date along with a title page.  the assignment must be in ms word format, 1 excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" comparison="" of="" wireless="" communication="" technologies="" 20="" finding="" is="" clearly="" linked="" and="" well="" justified="" finding="" is="" clearly="" linked="" and="" justified="" finding="" is="" linked="" and="" convincing="" finding="" is="" not="" linked="" and="" unjustified="" finding="" is="" not="" available="" mn603="" wireless="" networks="" and="" security="" page#4="" of="" 4="" prepared="" by:="" dr="" javed="" ali="" baloch="" moderated="" by:="" a/prof="" savitri="" bevinakoppa="" march,="" 2018="" evaluation="" of="" wireless="" communication="" standards="" for="" cyber="" physical="" systems="" and="" internet="" of="" things="" 30="" exceptional="" evaluation="" of="" wireless="" communication="" standards="" for="" cyber="" physical="" systems="" and="" iot="" including="" all="" described="" standards="" good="" evaluation="" of="" wireless="" communicat="" ion="" standards="" for="" cyber="" physical="" systems="" and="" iot="" including="" all="" described="" standards="" evaluation="" of="" wireless="" communication="" standards="" for="" cyber="" physical="" systems="" and="" iot="" including="" all="" described="" standards="" evaluation="" of="" a="" few="" wireless="" communication="" standards="" for="" cyber="" physical="" systems="" and="" iot="" unable="" to="" evaluate="" wireless="" communication="" standards="" for="" cyber="" physical="" systems="" and="" iot="" wireless="" network="" performance="" 5="" identified="" the="" wireless="" communication="" standard="" and="" provided="" excellent="" justification="" identified="" the="" wireless="" communicat="" ion="" standard="" and="" provided="" good="" justification="" identified="" the="" wireless="" communication="" standard="" and="" provided="" valid="" justification="" identified="" the="" wireless="" communication="" standard="" and="" failed="" to="" provide="" valid="" justification="" failed,="" to="" identify="" the="" wireless="" communication="" standard="" and="" provide="" justification="" conclusion="" 5="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="" errors="" prepared="" by:="" dr="" shaleeza="" sohail="" moderated="" by:="" dr="" nandini="" sidnal="" march,="" 2018="" assessment="" details="" and="" submission="" guidelines="" trimester="" t1="" -="" 2018="" unit="" code="" mn504="" unit="" title="" networked="" application="" management="" assessment="" type="" individual="" assignment="" assessment="" title="" critical="" analysis="" and="" problem="" solving="" in="" networked="" application="" management="" purpose="" of="" the="" assessment="" (with="" ulo="" mapping)="" the="" purpose="" of="" this="" assignment="" is="" to="" develop="" skills="" of="" analysing="" critically,="" and="" problem="" solving="" in="" regard="" to="" networked="" application="" management="" (nam).="" students="" will="" be="" able="" to="" complete="" the="" following="" ulos:="" b.="" apply="" socio-technical="" contexts="" in="" modern="" network="" applications="" and="" management;="" c.="" utilise="" common="" and="" emerging="" types="" of="" middleware="" to="" design="" and="" manage="" networked="" applications;="" weight="" 10%="" total="" marks="" 50="" word="" limit="" 1500="" -="" 2000="" due="" date="" 04/05/2018="" 11:55pm="" (friday="" week="" 7)="" submission="" guidelines="" ="" all="" work="" must="" be="" submitted="" on="" moodle="" by="" the="" due="" date="" along="" with="" a="" title="" page.="" ="" the="" assignment="" must="" be="" in="" ms="" word="" format,="">
Answered Same DayApr 20, 2020MN504

Answer To: Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018...

Dr answered on Apr 29 2020
148 Votes
Introduction
Crypto currency is a modern digital currency based on the distributed ledger which is termed as blockchain. Blockchain is digitized and distributed holds all the transactions that are related with crypto currency. Once the transaction executed successfully online, change of records created by transaction is not possible. First of all, blockchain was developed as a proposal for the accounting system on virtual currency with a concept of a techn
ology called distributed ledger. Therefore, due to distributed operation with distributed ledger it does not require centralized authority to manage. The management and authenticity of transaction with blockchain is in the hand of all the entities who are involved in the transactions of digitized crypto currency online through distributed ledger.
Part 1. Blockchain
Block chain uses the peer to peer network to records the transactions of digitized currency or other digital things in shared digital medium. The shared distributed ledger records the transactions permanently sequential chain of cryptographically protected hashed blocks.
Architecture of Blockchain
A blockchain is a distributed ledger that stores the tamper proof transactions based on the three basics frameworks information technology system [1]. These three basics components that make blockchain functioning as per the specifications are as follows.
Platform : An application having the capability to function of transactional database system and runs overs the distributed servers constructed like the distributed ledger. The nodes which run with the distributed ledger supports the transactions to be executed. This application is installed on all the servers and it is duty of each server to maintain the cryptography for all the transactions executing or executed and distributed ledger database adds the records. There is no need of third party to authenticate transactions as the users authenticate the transactions. The data of transaction of blockchain is being stored in the flat file system or database. The storing of the data depends upon the preference of users.
Nodes : Blockchain works on Internet protocol of IP protocol suite with a peer to peer network. As, with peer to peer network there is not any central control and management. Therefore, no central node is used to manage and control the functionalities of blockchain [2]. The nodes of blockchain collaborate in the services of distributed ledger management for the transactions. A node in blockchain has the role like a central authority or a third party which is trusted. A complete replicated copy of flat file or database system are stored on each of the node of blockchain. The owner information is also managed by the nodes when transaction is performed by a user. All the history of transactions are contained for all the users by nodes with blockchain.
The nodes of blockchain have the same structure due to fact that these are the parts of the blockchain network, but the node may do diverse role with respect to the different functional aspects of the business. Basically, there are four different categories of nodes found with blockchain and these all categories of nodes finds and manages the connections with peers and provide actions to validate the blocks of blockchain. The node does not play any lookup externally as each node maintains the copy of entire blockchain database system or flat file system
Protocol Stack for Network : Network protocols are used with blockchain to provide handshaking between the nodes, serialization to the exchange of message, and peer discovery to make contact. The overlay network of blockchain allows many categories of blockchain such as private and public. This network protocol stack layer is used by developer for blockchain to support different categories of applications of blockchain.
As, blockchain uses the Internet Protocol to discovery of peer nodes. TCP/IP protocol suite is the main protocol which governs the communication of transactional and other relevant information among the nodes those are booted. The general architectural with layered approach of blockchain is presented in figure 1.
Figure 1. General Cloud based Architecture of Blockchain
These three mentioned layers of blockchain are the architectural framework and the integration of different technologies such as cryptography, point to point network and programming with blockchain makes this functional in secured environment.
Features
Blockchain is heavily used in the field of digitized crypto currency transactions. The main features of blockchain...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here