Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018 Assessment Details and Submission Guidelines Trimester T1 2018 Unit Code MN603 Unit Title Wireless...

1 answer below »
Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018
Assessment Details and Submission Guidelines
Trimester T1 2018
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type
Individual Assignment 1
Assessment
Title
Evaluation of Wireless Communication technologies and wireless
communication standards for Cyber-Physical Systems and the Internet of Things
Purpose of the
assessment
(with ULO
Mapping)
The purpose of the assignment is to compare the wireless communication
technologies and evaluate the wireless communication standards for Cyber-
Physical Systems and Internet of Things. Students will be able to complete the
following ULOs:
. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;
Weight 10%
Total Marks 70
Word limit 1500 – 2000 words
Due Date XXXXXXXXXX/5/2018 11:55PM
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Cali
i (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment
Academic
Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:
http:
www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity
Section in your Unit Description.




http:
www.mit.edu.au/about
http:
www.mit.edu.au/about
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
http:
www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure
MN603 Wireless Networks and Security Page#2 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018
Assignment Description

Wireless sensors and actuators connected by the Internet of Things (IoT) are central to the design of
cyber-physical systems. Such systems require meeting strict requirements of throughput, latency and
ange, while maintaining low energy consumption and providing high levels of security. Wireless
communication technologies provide a platform for the foundation of such systems. Understanding
of the wireless communication principles and the wireless communication standards for cyber
physical systems and internet of things is essential for the design of such systems.


For further reading, could refer to the article “Wireless Communication and Security Issues for Cyber–
Physical Systems and the Internet-of-Things” [1]. The article is available on the IEEE Explore platform,
which could be accessed via the Melbourne Institute of Technology Li
ary.

The assessment requires the students to compare wireless communication technologies and
evaluate the wireless communication standards for wireless cyber physical systems and internet of
things. The students are required to submit a report, which includes:

1. Comparison of wireless communication technologies in terms of:

a. Communication spectrum
. modulation techniques
c. medium access control mechanism
d. network topologies

2. Evaluate wireless communication standards for cyber physical systems and internet of things
including:

a. UHF RFID and NFC
. ZigBee, Z-Wave
c. Bluetooth and Bluetooth Low Energy
d. Cellular Systems
e. IEEE 802.11P
f. Low-Power Wide Area Networks

3. Wireless Network Performance

Based on your evaluation of wireless communication standards for cyber physical systems
and internet of things, identify the standard which provides the best network performance.
Justify your selection.



References

[1] A. Burg, A. Chattopadhyay and K. Y. Lam, "Wireless Communication and Security Issues for
Cyber–Physical Systems and the Internet-of-Things," in Proceedings of the IEEE, vol. 106, no.
1, pp. 38-60, Jan. 2018.


MN603 Wireless Networks and Security Page#3 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018
Marking criteria:

Section to be included in
the report
Description of the section Marks
Introduction Outline of the report ( in 3-4 sentences) 5
Report Layout Report layout, style and language 5
Comparison of wireless
communication
technologies
Comparison of wireless communication technologies in
terms of:
a. Communication spectrum
. Modulation techniques
c. Medium access control mechanism
d. Network topologies
20
Evaluation of wireless
communication
standards for cyber
physical systems and
internet of things
Evaluate wireless communication standards for cyber
physical systems and internet of things including:
a. UHF RFID and NFC
. ZigBee, Z-Wave
c. Bluetooth and Bluetooth Low Energy
d. Cellular Systems
e. IEEE 802.11P
f. Low-Power Wide Area Networks
30
Wireless Network
performance
Based on your evaluation of wireless communication
standards for cyber physical systems and internet of
things, identify the standard which provides the best
network performance. Justify your selection.

5
Conclusion Write summary of the report 5
Reference style Follow IEEE reference style 5
Total 75
Marking Ru
ic for Assignment #1: Total Marks 75
Grade
Mark
HD
56-70
DI
49-55
CR
42-48
P
35-41
Fail
35
Excellent Very Good Good Satisfactory Unsatisfactory
Introduction

5
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated
Topics are
elevant and
soundly
analysed.
Generally
elevant and
analysed.
Some relevance
and
iefly
presented.
This is not
elevant to the
assignment
topic.
Report Layout

5
Exceptional report
layout, style and
language used
Very good
eport
layout, style
and
language
used
Good report
layout, style
and language
used
Acceptable
eport layout,
style and
language used.
Poor report
layout, style
and language
used.
Comparison of
wireless
communication
technologies
20
Finding is clearly
linked and well
justified
Finding is
clearly
linked and
justified
Finding is
linked and
convincing
Finding is not
linked and
unjustified
Finding is not
available
MN603 Wireless Networks and Security Page#4 of 4

Prepared by: Dr Javed Ali Baloch XXXXXXXXXXModerated by: A/Prof Savitri Bevinakoppa March, 2018
Evaluation of
wireless
communication
standards for
cyber physical
systems and
internet of
things

30
Exceptional
evaluation of
wireless
communication
standards for cyber
physical systems
and IoT including
all described
standards
Good
evaluation
of wireless
communicat
ion
standards
for cyber
physical
systems and
IoT including
all described
standards
Evaluation of
wireless
communication
standards for
cyber physical
systems and
IoT including all
described
standards
Evaluation of a
few wireless
communication
standards for
cyber physical
systems and IoT
Unable to
evaluate
wireless
communication
standards for
cyber physical
systems and IoT
Wireless
network
performance

5
Identified the
wireless
communication
standard and
provided excellent
justification
Identified
the wireless
communicat
ion standard
and
provided
good
justification
Identified the
wireless
communication
standard and
provided valid
justification
Identified the
wireless
communication
standard and
failed to provide
valid
justification
Failed, to
identify the
wireless
communication
standard and
provide
justification
Conclusion

5
Logic is clear and
easy to follow with
strong arguments
Consistency
logical and
convincing
Mostly
consistent
logical and
convincing
Adequate
cohesion and
conviction
Argument is
confused and
disjointed
Reference style

5
Clear styles with
excellent source of
eferences.
Clear
eferencing
style
Generally good
eferencing
style
Sometimes
clear
eferencing
style
Lacks
consistency
with many
e
ors


Prepared by: Dr Shaleeza Sohail XXXXXXXXXXModerated by: Dr Nandini Sidnal March, 2018
Assessment Details and Submission Guidelines
Trimester T XXXXXXXXXX
Unit Code MN504
Unit Title Networked Application Management
Assessment
Type
Individual Assignment
Assessment
Title
Critical Analysis and Problem Solving in Networked Application Management
Purpose of the
assessment
(with ULO
Mapping)
The purpose of this assignment is to develop skills of analysing critically, and
problem solving in regard to Networked Application Management (NAM).
Students will be able to complete the following ULOs:

. Apply socio-technical contexts in modern network applications and
management;
c. Utilise common and emerging types of middleware to design and
manage networked applications;

Weight 10%
Total Marks 50
Word limit XXXXXXXXXX
Due Date XXXXXXXXXX/05/2018 11:55PM (Friday Week 7)
Submission
Guidelines
 All work must be submitted on Moodle by the due date along with a title
Page.
 The assignment must be in MS Word format, 1
Answered Same Day Apr 20, 2020 MN504

Solution

Dr answered on Apr 29 2020
134 Votes
Introduction
Crypto cu
ency is a modern digital cu
ency based on the distributed ledger which is termed as blockchain. Blockchain is digitized and distributed holds all the transactions that are related with crypto cu
ency. Once the transaction executed successfully online, change of records created by transaction is not possible. First of all, blockchain was developed as a proposal for the accounting system on virtual cu
ency with a concept of a technology called distributed ledger. Therefore, due to distributed operation with distributed ledger it does not require centralized authority to manage. The management and authenticity of transaction with blockchain is in the hand of all the entities who are involved in the transactions of digitized crypto cu
ency online through distributed ledger.
Part 1. Blockchain
Block chain uses the peer to peer network to records the transactions of digitized cu
ency or other digital things in shared digital medium. The shared distributed ledger records the transactions permanently sequential chain of cryptographically protected hashed blocks.
Architecture of Blockchain
A blockchain is a distributed ledger that stores the tamper proof transactions based on the three basics frameworks information technology system [1]. These three basics components that make blockchain functioning as per the specifications are as follows.
Platform : An application having the capability to function of transactional database system and runs overs the distributed servers constructed like the distributed ledger. The nodes which run with the distributed ledger supports the transactions to be executed. This application is installed on all the servers and it is duty of each server to maintain the cryptography for all the transactions executing or executed and distributed ledger database adds the records. There is no need of third party to authenticate transactions as the users authenticate the transactions. The data of transaction of blockchain is being stored in the flat file system or database. The storing of the data depends upon the preference of users.
Nodes : Blockchain works on Internet protocol of IP protocol suite with a peer to peer network. As, with peer to peer network there is not any central control and management. Therefore, no central node is used to manage and control the functionalities of blockchain [2]. The nodes of blockchain collaborate in the services of distributed ledger management for the transactions. A node in blockchain has the role like a central authority or a third party which is trusted. A complete replicated copy of flat file or database system are stored on each of the node of blockchain. The owner information is also managed by the nodes when transaction is performed by a user. All the history of transactions are contained for all the users by nodes with blockchain.
The nodes of blockchain have the same structure due to fact that these are the parts of the blockchain network, but the node may do diverse role with respect to the different functional aspects of the business. Basically, there are four different categories of nodes found with blockchain and these all categories of nodes finds and manages the connections with peers and provide actions to validate the blocks of blockchain. The node does not play any lookup externally as each node maintains the copy of entire blockchain database system or flat file system
Protocol Stack for Network : Network protocols are used with blockchain to provide handshaking between the nodes, serialization to the exchange of message, and peer discovery to make contact. The overlay network of blockchain allows many categories of blockchain such as private and public. This network protocol stack layer is used by developer for blockchain to support different categories of applications of blockchain.
As, blockchain uses the Internet Protocol to discovery of peer nodes. TCP/IP protocol suite is the main protocol which governs the communication of transactional and other relevant information among the nodes those are booted. The general architectural with layered approach of blockchain is presented in figure 1.
Figure 1. General Cloud based Architecture of Blockchain
These three mentioned layers of blockchain are the architectural framework and the integration of different technologies such as cryptography, point to point network and programming with blockchain makes this functional in secured environment.
Features
Blockchain is heavily used in the field of digitized crypto cu
ency transactions. The main features of blockchain...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here