Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security...

1 answer below »
Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020


Assessment Details and Submission Guidelines
Trimester T1 2020
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Group Assignment (Max 5 members per group)
Assessment
Title
Implementation of Wireless networks and performance evaluation
Purpose of the
assessment
(with ULO
Mapping)
The purpose of the assignment is to implement wireless networks in Simulation
environment and analyse the routing protocols, evaluate them in terms of
security, QoS, and energy efficiency. Students will be able to complete the
following ULOs:
a. Analyse and compare wireless communication protocols;
. Test and evaluate various wireless networks performance;
d. Apply and evaluate wireless network security techniques with
consideration of ethical implications;
e. Design and implement secure enterprise wireless networks

Weight 30%
Total Marks 100
Word limit XXXXXXXXXX
Due Date Week 11, 7th June 2020 Time: 11:59pm
Submission
Guidelines
ï‚· All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
ï‚· The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
ï‚· Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension ï‚· If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct

ï‚· Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Page#2 of 4

Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020

Assignment Description

Task 1
Wireless networks performance varies from wired networks, the latter uses a guided medium and
wireless networks use unguided medium for transmission. To design and simulate wireless networks
the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2
simulator is a widely used simulation tool, which could generate trace files for analysis and comes
with a network animator to visualize the network performance.

This assessment requires students to compare and evaluate the performance of wireless routing
protocol using the NS - 2. The assessment requires students to design a wireless network topology in
NS - 2 and evaluate the generated trace files for a wireless routing protocol. The students are required
to ca
y out a critical analysis of the results of the protocol by plotting graphs and discussing the
outcomes.

The students are required to:
ï‚· Design a wireless network consisting of 25 nodes; the dimensions for the given topology are
1000x800. The agent type should be User Datagram Protocol (UDP) and the traffic Constant
Bit Rate (CBR). The simulation should run for 300 seconds. Random deployment of nodes is
equired and the nodes are required to transmit packets over the network. The wireless node
configuration should include the NS - 2 energy model.
ï‚· Run the simulation on routing protocol Destination Sequenced Distance Vector Routing
(DSDV) and Ad hoc On DemandDistance Vector (AODV). Critically analyse the trace files in
terms of packets sent, received and dropped. These parameters should be plotted on graphs
and discussed in detail.
ï‚· Include screenshots of the NAM (Network Animator) displaying the nodes deployed during
the simulation and add screen shots of the simulation.
ï‚· Conduct comparative analysis on the results for packets sent, received anddropped for the
two protocols.
ï‚· Appendix I should include the tcl srcript used in each simulation.

Task 2
Smart home or home automation technology provides homeowners’ security, comfort, convenience
and energy efficiency by enabling them to control smart devices, via an app on their smartphone or
other networked device. This technology enables you doing things such as turn the lights on/off,
stream music to a speaker, lock/open the doors remotely, and much more.
This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet
Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be
used in the home. Those IoT devices will be connected to the home WLAN that enables the users to
control the things through wireless technology. The users should also be able to control the things
when they are outside home (remote access). This means the WLAN should be connected to a global
network that enables the users to have control on devices when they are at work.
The students are required to complete the following steps:
ï‚· Explore the ethical implications in the design and implementation of Wireless Local Area
Networks (WLANs).
MN603 Wireless Networks and Security Page#3 of 4

Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020
ï‚· Test and prove a successful connectivity between users and IoT devices when they are at
home and when they are outside of home. You need to take a snapshot for each step of
testing followed by the explanation.

Marking Guide
Section to be included in the
eport
Description of the section Marks
Introduction Outline of the report 5

Report Layout
Report layout, style and
language
5
NS - 2 Simulation and network
design
Simulation screen shots for
outing protocol at 100s, 200s
and 300s simulation time with
description of the ongoing
events for both DSDV and
AODV
20
NS - 2 Trace file analysis Provide a critical analysis of
the two trace files in terms of
packets sent, received,
dropped
10
NS - 2 Simulation Results
Analysis
Plot and conduct comparative
analysis on the graphs for
packets sent, received,
dropped for the two protocols.
20
Explore ethical
implications
Investigate and report the
ethical implications in the
design and implementation of
a secure wireless LAN
10
Design, analysis, and
implementation of smart
home
Design, Analysis, and
implementation of a smart
home using WLAN
10
Testing Test and prove a successful of
connectivity between users
and IoT devices when they are
at home and when they are at
work. You need to take a
snapshot for each step of
testing followed by the
explanation.
10
Conclusion Write summary of the report
highlighting the positive and
negative points
5

MN603 Wireless Networks and Security Page#4 of 4

Prepared by: Dr Nazmus Shaker Nafi XXXXXXXXXXModerated by: Dr Sanjeeb Shrestha May, 2020
Reference style Follow IEEE reference style
and format
5
Marking Ru
ic for Assignment #1: Total Marks 100
Grade
Mark
HD
80-100
DI
70-79
CR
60-69
P
50-59
Fail
50
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction/5 All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some relevance
and
iefly
presented.
This is not
elevant to the
assignment
topic.
Report Layout
5
Exceptional report
layout, style and
language used
Very good
eport
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
eport layout,
style and
language used
Poor report
layout, style
and language
used
Design of
Networks in NS
- 2
20
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
equirements
Demonstrat
ed good
ability to
think
critically and
present an
exceptional
design
considering
all the
equirement
s
Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
equirements.
Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.
NS - 2 Trace file
analysis /10

Excellent
understanding and
explanation on
trace file
parameters
Very good
understandi
ng and
explanation
on trace file
parameters
Good
understanding
and
explanation on
trace file
parameters
Demonstrated
understanding
and explanation
on trace file
parameters
Poor
understanding
and explanation
on trace file
parameters
NS - 2
Simulation
Results Analysis
20
Exceptional Result
Discussion and
comparative
analysis
Very good
Result
Discussion
and
comparative
analysis
Good Result
Discussion and
comparative
analysis
Fair Result
Discussion and
comparative
analysis
Unable to
discuss Results
Answered Same Day May 27, 2021 MN603

Solution

Kshitij answered on Jun 07 2021
123 Votes
58988.docx
MN603
Wireless Networks and Security
Contents
1. Introduction    3
2. NS - 2 Simulation and network design    3
3. NS - 2 Trace file analysis    5
4. NS - 2 Simulation Results Analysis    7
5. Explore Ethical Implication    8
6. Design, analysis, and implementation of smart home    8
6.1 Network Design    9
6.2 Analysis    9
6.3 Implementation    9
7. Testing    9
8. Conclusion    10
References    11
1. Introduction
In the given report we are going to design and discuss the NS 2 simulation over the packet tracer. NS 2 has been proved the most effective and efficient tool for the analysis of existing network. The network protocol that are been analysed on the NS 2 simulation can be wired or wireless. The cisco designs the packet tracer platform that is been used for the design and analysis of the different existing topologies. The this also been used for the analysis of the network of the real time system. In the given work we are going to analysis the ethical implementation with the network simulation and the analysis of the work with the help NS 2 tool.
2. NS - 2 Simulation and network design
In the given scenario the analysis of the network is been done over the NS 2 simulation software and the design is been done over the same software. There are many agents that can be used for the design of the network that can be AODV, DSDV, UDP and NSG. This design will be used to generate the script for the analysis of the network and in the last it will generate the output (Khandakar, 2012).
In the given image the network is been design with some specific number of nodes. The UDP number is been defined for the specific number of nodes and then it is been set to default for some specific set of duration. The links in between the nodes can be easily determined with the blue color. The connection is been setup in the given linkage with the speed of 1000 bytes.
The above image showing the scenario is been developed over the NSG as per the given simulation part of the scenario.
The given image clearly showing the communication channel in between the two different nodes that are been done by transfer the packets in between the two different nodes.
This is the connection file of the different nodes that are been design above. The c
size for the given network simulation is been set to the 210 c
. When the communication is been done in between the two different nodes then the destination, source address been stored with the proper sequence number and the proper packet ID.
3. NS - 2 Trace file analysis
For the analysis of the tracer file for the designed network design two different router protocol are been used in the simulation i.e. DSDV and AODV. The given is the screen shot for the tracer file that is been used for the design simulation.
The given screen shot is the screen shot for the analysis of the DSDV part over the simulation. The given number showing the number of nodes that are been communicated with each other. The above case specify the communication in between the neighbor (Gupta
Saket, 2011).
The above screen shot showing the AODV protocol for the tracer file that is been done in between the different nodes. The node transfers the data at 1000 bytes to the c
. The connection is been setup in the nodes that is been used to transfer the packets with the help of AODV packets. The packet of the communication is been transfe
ed to the nearest nodes.
4. NS - 2 Simulation Results Analysis
In the given section of the report the analysis of the routing protocol is been analyzed. The network is been designed for the NS2 for the network simulation.
The above graph showing the AODV platform, that is performing the analysis the nodes over the specific time interval. The graph is been showing the output of the packets that are been transfe
ed from one location to the another thorough the given time interval.
The above graph showing the DSDV platform, that is performing the analysis the nodes over the specific time interval. The graph is been showing the output of the packets that are been transfe
ed from one location to the another thorough the given time interval.
5. Explore Ethical Implication
This section includes the morality of the function that is used to make the decision of the communication in between the two different nodes. During the designing the node of the network there are many different ethical dilemmas are been analyzed that are seen while designing the network.
While designing the network the privacy and the decision making the first network dilemmas that are been faced. While on the other hand the third issue of ethical implication is been found is the events, accuracy and retention of the network.
For the removal of the issue the best suited design is been designed for the work that make the design capable for the ethical implication.
6. Design, analysis, and implementation of smart home
For the design of the IOT network the design is been implemented over the cisco packet tracer design the item that are been used for the design are as follows:
· Cisco Route
· Access Point
· Servers
· Modem
· Smart home devices
· Gateway
6.1 Network Design
The network is been design with the above specific devices for the smart home connection over the cisco packet tracer, the user can remotely access the devices from the wireless connections. There are fixed IP are also been defined for the design (Vijayalaskhmi, et al, 2011).
6.2 Analysis
The provide the analysis of the network design which has been done over the hierarchical way. The network design is been used to decide the weather the work as per the requirement or not. The approach that are been used for the design of the network are as follows:
· Access laye
· Core laye
· Distribution laye
6.3 Implementation
For the security point of vide the admin id pass word functionality is been provided in the network design for the user requirement.
7. Testing
The static routing testing is been perform for the proper functing of the network that showing the communication in between the network by sending the packet file weather the file receiving the packets or not.
8. Conclusion
For the given scenario the smart home device is successfully implemented over the cisco packet tracer. The work is been tested. The AODV and DSDV design is been perform successfully for the working. The simulation of the design is been done over the NS 2.
References
Gupta, S.K. and Saket, R.K., 2011. Performance metric comparison of AODV and DSDV routing protocols in MANETs using NS-2. International Journal of Research and Reviews in Applied Sciences, 7(3), pp.339-350.
Khandakar, A., 2012, June. Step by step procedural comparison of DSR, AODV and DSDV routing protocol. In International Proceedings of Computer Science & Information Tech (Vol. 40, No. 12).
Vijayalaskhmi, M., Patel, A. and Kulkarni, L., 2011. QoS parameter analysis on AODV and DSDV protocols in a wireless network. International Journal of Communication Network & Security, 1(1), pp.62-70.
2
Practical.nam
n -t * -s 0 -x 711 -y -192 -Z 0 -z 20 -v circle -c black
n -t * -s 1 -x 1163 -y -77 -Z 0 -z 20 -v circle -c black
n -t * -s 2 -x 1099 -y -128 -Z 0 -z 20 -v circle -c black
n -t * -s 3 -x 1150 -y 509 -Z 0 -z 20 -v circle -c black
n -t * -s 4 -x 567 -y 455 -Z 0 -z 20 -v circle -c black
n -t * -s 5 -x 1203 -y 283 -Z 0 -z 20 -v circle -c black
n -t * -s 6 -x 838 -y 410 -Z 0 -z 20 -v circle -c black
n -t * -s 7 -x 857 -y 554 -Z 0 -z 20 -v circle -c black
n -t * -s 8 -x 1377 -y 360 -Z 0 -z 20 -v circle -c black
n -t * -s 9 -x 623 -y -69 -Z 0 -z 20 -v circle -c black
n -t * -s 10 -x 1004 -y -144 -Z 0 -z 20 -v circle -c black
n -t * -s 11 -x 655 -y -107 -Z 0 -z 20 -v circle -c black
n -t * -s 12 -x 886 -y 489 -Z 0 -z 20 -v circle -c black
n -t * -s 13 -x 537 -y -127 -Z 0 -z 20 -v circle -c black
n -t * -s 14 -x 524 -y 633 -Z 0 -z 20 -v circle -c black
n -t * -s 15 -x 1316 -y 579 -Z 0 -z 20 -v circle -c black
n -t * -s 16 -x 821 -y -111 -Z 0 -z 20 -v circle -c black
n -t * -s 17 -x 1297 -y 65 -Z 0 -z 20 -v circle -c black
n -t * -s 18 -x 903 -y 120 -Z 0 -z 20 -v circle -c black
n -t * -s 19 -x 1351 -y -271 -Z 0 -z 20 -v circle -c black
n -t * -s 20 -x 1391 -y 316 -Z 0 -z 20 -v circle -c black
n -t * -s 21 -x 1391 -y 116 -Z 0 -z 20 -v circle -c black
n -t * -s 22 -x 1025 -y 305 -Z 0 -z 20 -v circle -c black
n -t * -s 23 -x 1484 -y 61 -Z 0 -z 20 -v circle -c black
n -t * -s 24 -x 1053 -y 575 -Z 0 -z 20 -v circle -c black
V -t * -v 1.0a5 -a 0
W -t * -x 2573 -y 100
A -t * -n 1 -p 0 -o 0x7fffffff -c 30 -a 1
A -t * -h 1 -m 1073741823 -s 0
+ -t 0.005340314 -s 0 -d -1 -p message -e 32 -c 2 -a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here