Assessment Details and Submission Guidelines Trimester T1 2019 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Type Individual Assessment Assessment Title WLAN tools and Advanced...

1 answer below »
How much for it.?


Assessment Details and Submission Guidelines Trimester T1 2019 Unit Code BN303 Unit Title Wireless Networks and Security Assessment Type Individual Assessment Assessment Title WLAN tools and Advanced Wireless Technologies Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to become familiar with WLAN tools and develop an understanding of wireless technologies used in various networks. Students will be able to complete the following ULOs: b. Compare standards-based technologies used in various networks; c. Test and evaluate various wireless networks performance; Weight 20% Total Marks 60 Word limit 1500 – 2000 Words Due Date 30th April, 2019 (17:00) Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly to the School's Administration Officer, in Melbourne on Level 6 or in Sydney on Level 7. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure BN303 Wireless Network and Security Page 2 of 4 Assignment Description This assignment includes TWO tasks: Part A: Install demo or full versions of TWO WLAN sniffing tools where the tool is open source, on your terminal and take screen shots to demonstrate that you have completed the installation and developed an understanding of the main features of the tool. Ensure the screenshots are readable, appropriate and analysed critically.  Level of complexity  Included features  Comparison of models in functionalities  Discussion of advantages and disadvantages  Summarize your findings Part B: Scenario A local engineering group has assigned you to present findings on 3 most recent wireless technologies. Research these technologies and discuss how they could be used in real time applications. Identify the strengths, weaknesses and security issues of these wireless technologies. Conclude the report by proposing, the wireless technology, which you believe, would stand out. Provide a valid argument for the proposal. Use diagrams, tables, and graphs where appropriate. Submission Guidelines: - Create a word document and save it as “BN303_A1_Student Name” - Use IEEE referencing style with in-text citation. BN303 Wireless Network and Security Page 3 of 4 Marking Criteria: Section to be included in the report Description of the section Marks Part A Introduction Outline of the report ( in 3-4 sentences) 3 Report Layout Report layout, style and language 3 WLAN Tools Install demo or full versions of TWO WLAN tools where the tool is open source, on your terminal and take screen shots to demonstrate that you have completed the installation and developed an understanding of the main features of the tool. Ensure the screenshots are readable, appropriate and analysed critically. Discuss the following aspects.  Level of complexity  Included features  Comparison of models in functionalities  Discussion of advantages and disadvantages  Summarize your findings  Screen shots of captured packets 4 4 4 4 4 4 Part B Wireless Technologies Research 3 most recent wireless technologies and discuss how they could be used in real time applications. Identify the strengths, weaknesses and security issues 12 Propose Propose a most recent wireless technology, with valid arguments. 8 Conclusion Write summary of the report 5 Reference style Follow IEEE reference style 5 Total 60 BN303 Wireless Network and Security Page 4 of 4 Marking Rubric Grade Mark HD 80% - 100% D 70% - 79% CR 60% - 69% P 50% - 59% Fail<50% excellent very good good satisfactory unsatisfactory introduction /3 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /3 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used. poor report layout, style and language used. wlan tools /24 explanation is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent and convincing adequate cohesion and conviction argument is confused and disjointed wireless technology /12 demonstrated excellent ability to think technology critically and sourced reference material appropriately demonstrated excellent ability to think technology critically but did not source reference material appropriately demonstrate d ability to think technology critically and sourced reference material appropriately demonstrated ability to think technology critically and did not source reference material appropriately did not demonstrate ability to think technology critically and did not source reference material appropriately propose /8 exceptional proposal of communication technologies for iot good proposal of communication technologies for iot balanced proposal of communicatio n technologies for iot acceptable proposal of communicatio n technologies for iot failed to propose communication technologies for iot conclusion /5 logic is clear and easy to follow with strong arguments consistency logical and convincing mostly consistent logical and convincing adequate cohesion and conviction argument is confused and disjointed reference style /5 clear styles with excellent source of references. clear referencing style generally good referencing style sometimes clear referencing style lacks consistency with many errors excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction="" 3="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 3="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used.="" poor="" report="" layout,="" style="" and="" language="" used.="" wlan="" tools="" 24="" explanation="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" wireless="" technology="" 12="" demonstrated="" excellent="" ability="" to="" think="" technology="" critically="" and="" sourced="" reference="" material="" appropriately="" demonstrated="" excellent="" ability="" to="" think="" technology="" critically="" but="" did="" not="" source="" reference="" material="" appropriately="" demonstrate="" d="" ability="" to="" think="" technology="" critically="" and="" sourced="" reference="" material="" appropriately="" demonstrated="" ability="" to="" think="" technology="" critically="" and="" did="" not="" source="" reference="" material="" appropriately="" did="" not="" demonstrate="" ability="" to="" think="" technology="" critically="" and="" did="" not="" source="" reference="" material="" appropriately="" propose="" 8="" exceptional="" proposal="" of="" communication="" technologies="" for="" iot="" good="" proposal="" of="" communication="" technologies="" for="" iot="" balanced="" proposal="" of="" communicatio="" n="" technologies="" for="" iot="" acceptable="" proposal="" of="" communicatio="" n="" technologies="" for="" iot="" failed="" to="" propose="" communication="" technologies="" for="" iot="" conclusion="" 5="" logic="" is="" clear="" and="" easy="" to="" follow="" with="" strong="" arguments="" consistency="" logical="" and="" convincing="" mostly="" consistent="" logical="" and="" convincing="" adequate="" cohesion="" and="" conviction="" argument="" is="" confused="" and="" disjointed="" reference="" style="" 5="" clear="" styles="" with="" excellent="" source="" of="" references.="" clear="" referencing="" style="" generally="" good="" referencing="" style="" sometimes="" clear="" referencing="" style="" lacks="" consistency="" with="" many="">
Answered Same DayApr 21, 2021BN303

Answer To: Assessment Details and Submission Guidelines Trimester T1 2019 Unit Code BN303 Unit Title Wireless...

Amit answered on Apr 30 2021
143 Votes
Title of the assignment: Wireless network and security
Student’s name:
Student ID:
Professor’s name:
Course title: BN 303
Date: 4/26/2019
Table of Contents
1.    Introduction    3
2.    Wireshark installation    3
3.    PRTG installation    12
4.    Wireless technology: WiGig, Bluetooth Smart and Apple iBeacon    18
5.    Wi
Gig as the proposed wireless technology    20
6.    Conclusion    20
7.    References:    21
1. Introduction
The ethical way of network analysis to diagnose the network problems is called sniffing. There are free and payment based tools which can easily diagnose the networking problems. The Wireshark and PRTG are free ware tools used for the same functions. The wireless technologies are also changing on daily bases. The WiGig, BT smart and IBeacon from Apple Corporation are few latest wireless technologies which are discussed in my presented work. The recommendation reasons for using WiGig are also provided and explained. This complete work is providing enough information on WLAN sniffing tools and latest wireless technologies.
2. Wireshark installation
The Wireshark is an effective tool for WLAN sniffing. The step based process to install and use this sniffing tool is provided under:
1) Download the Wireshark tool from the authorized place as shown below:
2) The license agreement of wireshark will arrive, sp accept it.
3) Now it will ask for selecting the required components. So, select all required components and proceed to next step:
4) Now, this sniffing tool allows creating shortcuts and makes association of possible supported file extensions.
5) As sniffing tool is ready to install, so select the desired location in hard disk to complete installation process.
6) Now, it will ask to additionally make installation of Npcap. So, select it and proceed to next step.
7) Now it will ask to install USBPcap. But we are using this tool for WLAN sniffing, so, no need to select it.
8) Now the installation is started and is shown:
9) Once installed, it will show completion message.
10) Now start this tool for WLAN sniffing and it will start sniffing the wireless network.
11) Now start capturing the WLAN connection and is:
12) Now the monitoring process of this sniffing is shown:
13) Now the I/O monitoring process of this sniffing is shown:
14) Now, the analysis of this flow graph is :
15) Finally we can save the complete captured packets for further analysis.
    Wireshark sniffing tool
    Complexity level:
    The effective and rich analysis of VoIP increases its complexity level. But the display filer makes it most powerful and commonly used free sniffing tool in industry.
    Features:
    1) It can make analysis of live WLAN.
2) Also able to make analysis during offline mode.
3) Administrator can browse the captured data as TTY or GUI.
4) The output of this sniffing tool can be generated as plain text, CSV or XML.
    Functionalities comparison:
    1) It provides functionality to work on most of the operating systems.
2) The functionality of VoIP analysis is most effective among other tools.
    Advantages:
    1) It provides...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here