Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security...

1 answer below »
file


Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Assessment Details and Submission Guidelines Trimester T1 2020 Unit Code MN603 Unit Title Wireless Networks and Security Assessment Type Group Assignment (Max 5 members per group) Assessment Title Implementation of Wireless networks and performance evaluation Purpose of the assessment (with ULO Mapping) The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs: a. Analyse and compare wireless communication protocols; b. Test and evaluate various wireless networks performance; d. Apply and evaluate wireless network security techniques with consideration of ethical implications; e. Design and implement secure enterprise wireless networks Weight 30% Total Marks 100 Word limit 2500-3000 Due Date Week 11, 7th June 2020 Time: 11:59pm Submission Guidelines  All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.  The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.  Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style. Extension  If an extension of time to submit work is required, a Special Consideration Application must be submitted directly on AMS. You must submit this application three working days prior to the due date of the assignment. Further information is available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/specialconsiderationdeferment Academic Misconduct  Academic Misconduct is a serious offence. Depending on the seriousness of the case, penalties can vary from a written warning or zero marks to exclusion from the course or rescinding the degree. Students should make themselves familiar with the full policy and procedure available at: http://www.mit.edu.au/about-mit/institute-publications/policies- procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy- Procedure. For further information, please refer to the Academic Integrity Section in your Unit Description. http://www.mit.edu.au/about http://www.mit.edu.au/about http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/special-considerationdeferment http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure http://www.mit.edu.au/about-mit/institute-publications/policies-procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-Procedure MN603 Wireless Networks and Security Page#2 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Assignment Description Task 1 Wireless networks performance varies from wired networks, the latter uses a guided medium and wireless networks use unguided medium for transmission. To design and simulate wireless networks the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2 simulator is a widely used simulation tool, which could generate trace files for analysis and comes with a network animator to visualize the network performance. This assessment requires students to compare and evaluate the performance of wireless routing protocol using the NS - 2. The assessment requires students to design a wireless network topology in NS - 2 and evaluate the generated trace files for a wireless routing protocol. The students are required to carry out a critical analysis of the results of the protocol by plotting graphs and discussing the outcomes. The students are required to:  Design a wireless network consisting of 25 nodes; the dimensions for the given topology are 1000x800. The agent type should be User Datagram Protocol (UDP) and the traffic Constant Bit Rate (CBR). The simulation should run for 300 seconds. Random deployment of nodes is required and the nodes are required to transmit packets over the network. The wireless node configuration should include the NS - 2 energy model.  Run the simulation on routing protocol Destination Sequenced Distance Vector Routing (DSDV) and Ad hoc On DemandDistance Vector (AODV). Critically analyse the trace files in terms of packets sent, received and dropped. These parameters should be plotted on graphs and discussed in detail.  Include screenshots of the NAM (Network Animator) displaying the nodes deployed during the simulation and add screen shots of the simulation.  Conduct comparative analysis on the results for packets sent, received anddropped for the two protocols.  Appendix I should include the tcl srcript used in each simulation. Task 2 Smart home or home automation technology provides homeowners’ security, comfort, convenience and energy efficiency by enabling them to control smart devices, via an app on their smartphone or other networked device. This technology enables you doing things such as turn the lights on/off, stream music to a speaker, lock/open the doors remotely, and much more. This task aims to simulate a smart home using Internet of Things (IoT) technology in Cisco Packet Tracer. Students will purely practice with the IoT component offered by the Cisco Packet Tracer to be used in the home. Those IoT devices will be connected to the home WLAN that enables the users to control the things through wireless technology. The users should also be able to control the things when they are outside home (remote access). This means the WLAN should be connected to a global network that enables the users to have control on devices when they are at work. The students are required to complete the following steps:  Explore the ethical implications in the design and implementation of Wireless Local Area Networks (WLANs). MN603 Wireless Networks and Security Page#3 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020  Test and prove a successful connectivity between users and IoT devices when they are at home and when they are outside of home. You need to take a snapshot for each step of testing followed by the explanation. Marking Guide Section to be included in the report Description of the section Marks Introduction Outline of the report 5 Report Layout Report layout, style and language 5 NS - 2 Simulation and network design Simulation screen shots for routing protocol at 100s, 200s and 300s simulation time with description of the ongoing events for both DSDV and AODV 20 NS - 2 Trace file analysis Provide a critical analysis of the two trace files in terms of packets sent, received, dropped 10 NS - 2 Simulation Results Analysis Plot and conduct comparative analysis on the graphs for packets sent, received, dropped for the two protocols. 20 Explore ethical implications Investigate and report the ethical implications in the design and implementation of a secure wireless LAN 10 Design, analysis, and implementation of smart home Design, Analysis, and implementation of a smart home using WLAN 10 Testing Test and prove a successful of connectivity between users and IoT devices when they are at home and when they are at work. You need to take a snapshot for each step of testing followed by the explanation. 10 Conclusion Write summary of the report highlighting the positive and negative points 5 MN603 Wireless Networks and Security Page#4 of 4 Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Reference style Follow IEEE reference style and format 5 Marking Rubric for Assignment #1: Total Marks 100 Grade Mark HD 80-100 DI 70-79 CR 60-69 P 50-59 Fail<50 excellent very good good satisfactory unsatisfactory introduction/5 all topics are pertinent and covered in depth. ability to think critically and source material is demonstrated topics are relevant and soundly analysed. generally relevant and analysed. some relevance and briefly presented. this is not relevant to the assignment topic. report layout /5 exceptional report layout, style and language used very good report layout, style and language used good report layout, style and language used acceptable report layout, style and language used poor report layout, style and language used design of networks in ns - 2 /20 demonstrated excellent ability to think critically and present an exceptional design considering all the requirements demonstrat ed good ability to think critically and present an exceptional design considering all the requirement s demonstrate d good ability to think critically and present a good design considering all the requirements. demonstrated ability to think critically and present a design did not demonstrate ability to think critically and present a design. ns - 2 trace file analysis /10 excellent understanding and explanation on trace file parameters very good understandi ng and explanation on trace file parameters good understanding and explanation on trace file parameters demonstrated understanding and explanation on trace file parameters poor understanding and explanation on trace file parameters ns - 2 simulation results analysis /20 exceptional result discussion and comparative analysis very good result discussion and comparative analysis good result discussion and comparative analysis fair result discussion and comparative analysis unable to discuss results excellent="" very="" good="" good="" satisfactory="" unsatisfactory="" introduction/5="" all="" topics="" are="" pertinent="" and="" covered="" in="" depth.="" ability="" to="" think="" critically="" and="" source="" material="" is="" demonstrated="" topics="" are="" relevant="" and="" soundly="" analysed.="" generally="" relevant="" and="" analysed.="" some="" relevance="" and="" briefly="" presented.="" this="" is="" not="" relevant="" to="" the="" assignment="" topic.="" report="" layout="" 5="" exceptional="" report="" layout,="" style="" and="" language="" used="" very="" good="" report="" layout,="" style="" and="" language="" used="" good="" report="" layout,="" style="" and="" language="" used="" acceptable="" report="" layout,="" style="" and="" language="" used="" poor="" report="" layout,="" style="" and="" language="" used="" design="" of="" networks="" in="" ns="" -="" 2="" 20="" demonstrated="" excellent="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirements="" demonstrat="" ed="" good="" ability="" to="" think="" critically="" and="" present="" an="" exceptional="" design="" considering="" all="" the="" requirement="" s="" demonstrate="" d="" good="" ability="" to="" think="" critically="" and="" present="" a="" good="" design="" considering="" all="" the="" requirements.="" demonstrated="" ability="" to="" think="" critically="" and="" present="" a="" design="" did="" not="" demonstrate="" ability="" to="" think="" critically="" and="" present="" a="" design.="" ns="" -="" 2="" trace="" file="" analysis="" 10="" excellent="" understanding="" and="" explanation="" on="" trace="" file="" parameters="" very="" good="" understandi="" ng="" and="" explanation="" on="" trace="" file="" parameters="" good="" understanding="" and="" explanation="" on="" trace="" file="" parameters="" demonstrated="" understanding="" and="" explanation="" on="" trace="" file="" parameters="" poor="" understanding="" and="" explanation="" on="" trace="" file="" parameters="" ns="" -="" 2="" simulation="" results="" analysis="" 20="" exceptional="" result="" discussion="" and="" comparative="" analysis="" very="" good="" result="" discussion="" and="" comparative="" analysis="" good="" result="" discussion="" and="" comparative="" analysis="" fair="" result="" discussion="" and="" comparative="" analysis="" unable="" to="" discuss="">
Answered Same DayMay 27, 2021MN603

Answer To: Prepared by: Dr Nazmus Shaker Nafi Moderated by: Dr Sanjeeb Shrestha May, 2020 Assessment Details...

Kshitij answered on Jun 07 2021
123 Votes
58988.docx
MN603
Wireless Networks and Security
Contents
1. Introduction    3
2. NS - 2 Simulation and network design    3
3. NS - 2 Trace file analysis    5
4. NS - 2 Simulation Results Analysis    7
5. Explore Ethical Implication    8
6. Design, analysis, and implementation of smart home    8
6.1 Network Design    9
6.2 Analysis    9
6.3 Implementation    9
7. Testing    9
8. Conclusion    10
References    11
1. Introduction
In the given report we are going to design and discuss the NS 2 simulation over the packet tracer. NS 2 has been proved the most effective and efficient tool for the analysis of existing network. The network protocol that are been analysed on the NS 2 simulation can be wired or wireless. The cisco designs the packet tracer platform that is been used for the design and analysis of the different existing topologies. The this also been used for the analysis of
the network of the real time system. In the given work we are going to analysis the ethical implementation with the network simulation and the analysis of the work with the help NS 2 tool.
2. NS - 2 Simulation and network design
In the given scenario the analysis of the network is been done over the NS 2 simulation software and the design is been done over the same software. There are many agents that can be used for the design of the network that can be AODV, DSDV, UDP and NSG. This design will be used to generate the script for the analysis of the network and in the last it will generate the output (Khandakar, 2012).
In the given image the network is been design with some specific number of nodes. The UDP number is been defined for the specific number of nodes and then it is been set to default for some specific set of duration. The links in between the nodes can be easily determined with the blue color. The connection is been setup in the given linkage with the speed of 1000 bytes.
The above image showing the scenario is been developed over the NSG as per the given simulation part of the scenario.
The given image clearly showing the communication channel in between the two different nodes that are been done by transfer the packets in between the two different nodes.
This is the connection file of the different nodes that are been design above. The cbr size for the given network simulation is been set to the 210 cbr. When the communication is been done in between the two different nodes then the destination, source address been stored with the proper sequence number and the proper packet ID.
3. NS - 2 Trace file analysis
For the analysis of the tracer file for the designed network design two different router protocol are been used in the simulation i.e. DSDV and AODV. The given is the screen shot for the tracer file that is been used for the design simulation.
The given screen shot is the screen shot for the analysis of the DSDV part over the simulation. The given number showing the number of nodes that are been communicated with each other. The above case specify the communication in between the neighbor (Gupta
Saket, 2011).
The above screen shot showing the AODV protocol for the tracer file that is been done in between the different nodes. The node transfers the data at 1000 bytes to the cbr. The connection is been setup in the nodes that is been used to transfer the packets with the help of AODV packets. The packet of the communication is been transferred to the nearest nodes.
4. NS - 2 Simulation Results Analysis
In the given section of the report the analysis of the routing protocol is been analyzed. The network is been designed for the NS2 for the network simulation.
The above graph showing the AODV platform, that is performing the analysis the nodes over the specific time interval. The graph is been showing the output of the packets that are been transferred from one location to the another thorough the given time interval.
The above graph showing the DSDV platform, that is performing the analysis the nodes over the specific time interval. The graph is been showing the output of the packets that are been transferred from one location to the another thorough the given time interval.
5. Explore Ethical Implication
This section includes the morality of the function that is used to make the decision of the communication in between the two different nodes. During the designing the node of the network there are many different ethical dilemmas are been analyzed that are seen while designing the network.
While designing the network the privacy and the decision making the first network dilemmas that are been faced. While on the other hand the third issue of ethical implication is been found is the events, accuracy and retention of the network.
For the removal of the issue the best suited design is been designed for the work that make the design capable for the ethical implication.
6. Design, analysis, and implementation of smart home
For the design of the IOT network the design is been implemented over the cisco packet tracer design the item that are been used for the design are as follows:
· Cisco Router
· Access Point
· Servers
· Modem
· Smart home devices
· Gateway
6.1 Network Design
The network is been design with the above specific devices for the smart home connection over the cisco packet tracer, the user can remotely access the devices from the wireless connections. There are fixed IP are also been defined for the design (Vijayalaskhmi, et al, 2011).
6.2 Analysis
The provide the analysis of the network design which has been done over the hierarchical way. The network design is been used to decide the weather the work as per the requirement or not. The approach that are been used for the design of the network are as follows:
· Access layer
· Core layer
· Distribution layer
6.3 Implementation
For the security point of vide the admin id pass word functionality is been provided in the network design for the user requirement.
7. Testing
The static routing testing is been perform for the proper functing of the network that showing the communication in between the network by sending the packet file weather the file receiving the packets or not.
8. Conclusion
For the given scenario the smart home device is successfully implemented over the cisco packet tracer. The work is been tested. The AODV and DSDV design is been perform successfully for the working. The simulation of the design is been done over the NS 2.
References
Gupta, S.K. and Saket, R.K., 2011. Performance metric comparison of AODV and DSDV routing protocols in MANETs using NS-2. International Journal of Research and Reviews in Applied Sciences, 7(3), pp.339-350.
Khandakar, A., 2012, June. Step by step procedural comparison of DSR, AODV and DSDV routing protocol. In International Proceedings of Computer Science & Information Tech (Vol. 40, No. 12).
Vijayalaskhmi, M., Patel, A. and Kulkarni, L., 2011. QoS parameter analysis on AODV and DSDV protocols in a wireless network. International Journal of Communication Network & Security, 1(1), pp.62-70.
2
Practical.nam
n -t * -s 0 -x 711 -y -192 -Z 0 -z 20 -v circle -c black
n -t * -s 1 -x 1163 -y -77 -Z 0 -z 20 -v circle -c black
n -t * -s 2 -x 1099 -y -128 -Z 0 -z 20 -v circle -c black
n -t * -s 3 -x 1150 -y 509 -Z 0 -z 20 -v circle -c black
n -t * -s 4 -x 567 -y 455 -Z 0 -z 20 -v circle -c black
n -t * -s 5 -x 1203 -y 283 -Z 0 -z 20 -v circle -c black
n -t * -s 6 -x 838 -y 410 -Z 0 -z 20 -v circle -c black
n -t * -s 7 -x 857 -y 554 -Z 0 -z 20 -v circle -c black
n -t * -s 8 -x 1377 -y 360 -Z 0 -z 20 -v circle -c black
n -t * -s 9 -x 623 -y -69 -Z 0 -z 20 -v circle -c black
n -t * -s 10 -x 1004 -y -144 -Z 0 -z 20 -v circle -c black
n -t * -s 11 -x 655 -y -107 -Z 0 -z 20 -v circle -c black
n -t * -s 12 -x 886 -y 489 -Z 0 -z 20 -v circle -c black
n -t * -s 13 -x 537 -y -127 -Z 0 -z 20 -v circle -c black
n -t * -s 14 -x 524 -y 633 -Z 0 -z 20 -v circle -c black
n -t * -s 15 -x 1316 -y 579 -Z 0 -z 20 -v circle -c black
n -t * -s 16 -x 821 -y -111 -Z 0 -z 20 -v circle -c black
n -t * -s 17 -x 1297 -y 65 -Z 0 -z 20 -v circle -c black
n -t * -s 18 -x 903 -y 120 -Z 0 -z 20 -v circle -c black
n -t * -s 19 -x 1351 -y -271 -Z 0 -z 20 -v circle -c black
n -t * -s 20 -x 1391 -y 316 -Z 0 -z 20 -v circle -c black
n -t * -s 21 -x 1391 -y 116 -Z 0 -z 20 -v circle -c black
n -t * -s 22 -x 1025 -y 305 -Z 0 -z 20 -v circle -c black
n -t * -s 23 -x 1484 -y 61 -Z 0 -z 20 -v circle -c black
n -t * -s 24 -x 1053 -y 575 -Z 0 -z 20 -v circle -c black
V -t * -v 1.0a5 -a 0
W -t * -x 2573 -y 100
A -t * -n 1 -p 0 -o 0x7fffffff -c 30 -a 1
A -t * -h 1 -m 1073741823 -s 0
+ -t 0.005340314 -s 0 -d -1 -p message -e 32 -c 2 -a...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here