Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020
Assessment Details and Submission Guidelines
Trimester T1 2020
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Group Assignment (Max 5 members per group)
Assessment
Title
Implementation of Wireless networks and performance evaluation
Purpose of the
assessment
(with ULO
Mapping)
The purpose of the assignment is to implement wireless networks in Simulation
environment and analyse the routing protocols, evaluate them in terms of
security, QoS, and energy efficiency. Students will be able to complete the
following ULOs:
a. Analyse and compare wireless communication protocols;
. Test and evaluate various wireless networks performance;
d. Apply and evaluate wireless network security techniques with
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks
Weight 30%
Total Marks 100
Word limit XXXXXXXXXX
Due Date Week 11, 7th June 2020 Time: 11:59pm
Submission
Guidelines
ï‚· All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
ï‚· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
ï‚· Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension ï‚· If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct
ï‚· Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Page#2 of 4
Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020
Assignment Description
Task 1
Wireless networks performance varies from wired networks, the latter uses a guided medium and
wireless networks use unguided medium for transmission. To design and simulate wireless networks
the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2
simulator is a widely used simulation tool, which could generate trace files for analysis and comes
with a network animator to visualize the network performance.
This assessment requires students to compare and evaluate the performance of wireless routing
protocol using the NS - 2. The assessment requires students to design a wireless network topology in
NS - 2 and evaluate the generated trace files for a wireless routing protocol. The students are required
to ca
y out a critical analysis of the results of the protocol by plotting graphs and discussing the
outcomes.
The students are required to:
ï‚· Design a wireless network consisting of 25 nodes; the dimensions for the given topology are
1000x800. The agent type should be User Datagram Protocol (UDP) and the traffic Constant
Bit Rate (CBR). The simulation should run for 300 seconds. Random deployment of nodes is
equired and the nodes are required to transmit packets over the network. The wireless node
configuration should include the NS - 2 energy model.
ï‚· Run the simulation on routing protocol Destination Sequenced Distance Vector Routing
(DSDV) and Ad hoc On DemandDistance Vector (AODV). Critically analyse the trace files in
terms of packets sent, received and dropped. These parameters should be plotted on graphs
and discussed in detail.
ï‚· Include screenshots of the NAM (Network Animator) displaying the nodes deployed during
the simulation and add screen shots of the simulation.
ï‚· Conduct comparative analysis on the results for packets sent, received anddropped for the
two protocols.
ï‚· Appendix I should include the tcl srcript used in each simulation.
Task 2
Smart home or home automation technology provides homeowners’ security, comfort, convenience
and energy efficiency by enabling them to control smart devices, via an app on their smartphone or
other networked device. This technology enables you doing things such as turn the lights on/off,
stream music to a speaker, lock/open the doors remotely, and much more.
This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet
Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be
used in the home. Those IoT devices will be connected to the home WLAN that enables the users to
control the things through wireless technology. The users should also be able to control the things
when they are outside home (remote access). This means the WLAN should be connected to a global
network that enables the users to have control on devices when they are at work.
The students are required to complete the following steps:
ï‚· Explore the ethical implications in the design and implementation of Wireless Local Area
Networks (WLANs).
MN603 Wireless Networks and Security Page#3 of 4
Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020
ï‚· Test and prove a successful connectivity between users and IoT devices when they are at
home and when they are outside of home. You need to take a snapshot for each step of
testing followed by the explanation.
Marking Guide
Section to be included in the
eport
Description of the section Marks
Introduction Outline of the report 5
Report Layout
Report layout, style and
language
5
NS - 2 Simulation and network
design
Simulation screen shots for
outing protocol at 100s, 200s
and 300s simulation time with
description of the ongoing
events for both DSDV and
AODV
20
NS - 2 Trace file analysis Provide a critical analysis of
the two trace files in terms of
packets sent, received,
dropped
10
NS - 2 Simulation Results
Analysis
Plot and conduct comparative
analysis on the graphs for
packets sent, received,
dropped for the two protocols.
20
Explore ethical
implications
Investigate and report the
ethical implications in the
design and implementation of
a secure wireless LAN
10
Design, analysis, and
implementation of smart
home
Design, Analysis, and
implementation of a smart
home using WLAN
10
Testing Test and prove a successful of
connectivity between users
and IoT devices when they are
at home and when they are at
work. You need to take a
snapshot for each step of
testing followed by the
explanation.
10
Conclusion Write summary of the report
highlighting the positive and
negative points
5
MN603 Wireless Networks and Security Page#4 of 4
Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020
Reference style Follow IEEE reference style
and format
5
Marking Ru
ic for Assignment #1: Total Marks 100
Grade
Mark
HD
80-100
DI
70-79
CR
60-69
P
50-59
Fail
50
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction/5 All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some relevance
and
iefly
presented.
This is not
elevant to the
assignment
topic.
Report Layout
5
Exceptional report
layout, style and
language used
Very good
eport
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
eport layout,
style and
language used
Poor report
layout, style
and language
used
Design of
Networks in NS
- 2
20
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
equirements
Demonstrat
ed good
ability to
think
critically and
present an
exceptional
design
considering
all the
equirement
s
Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
equirements.
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.
NS - 2 Trace file
analysis /10
Excellent
understanding and
explanation on
trace file
parameters
Very good
understandi
ng and
explanation
on trace file
parameters
Good
understanding
and
explanation on
trace file
parameters
Demonstrated
understanding
and explanation
on trace file
parameters
Poor
understanding
and explanation
on trace file
parameters
NS - 2
Simulation
Results Analysis
20
Exceptional Result
Discussion and
comparative
analysis
Very good
Result
Discussion
and
comparative
analysis
Good Result
Discussion and
comparative
analysis
Fair Result
Discussion and
comparative
analysis
Unable to
discuss Results