skip to Main Content

Due date: 24th-Sep-2014 • Question 1: 100- 200 words for each part; Question

Due date: 24th-Sep-2014 • Question 1: 100- 200 words for each part; Questions 2, 3 & 5: 400 – 600 words each; Question 6: 1000 – 2000 words. APA reference style should be used in the assignment. Please use this text book as the main reference : (will provide pdf version of book. ) Jorge, L. O. (2014). Guide to Wireless Communications (3rd ed.). Cengage Learning. ISBN: 978-1-111-30731-8 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to workplace situations. Write short notes after investigating the following scenarios: [2+2+4=8 marks] a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not? b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary? c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer’s 802.11 wireless network is interfering with his neighbour’s wireless transfers. You want to improve performance, but you do not have any control over the neighbour’s wireless connection (The only thing under your control is your customer’s wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective. i. Frequency Assignment – Assigning a different channel to the user’s wireless router. ii. Power Control — Lowering the transmit power of the user’s wireless router. iii. Enable RTS/CTS 2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any? [3+3=6 marks] 3. Explain how does the CSMA/CA in DCF handle media contention. [5 marks] 4. Suppose your company is going to provide services on broadband wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z): [6 marks] Feature WiMAX Wi-Fi Technology T Frequency band Channel bandwidth Radio Technology Half/Full Duplex Modulation technique Bandwidth Efficiency Access protocol Feature x Feature y Feature z 5. Define ‘throughput’ in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.[5 marks] 6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well. [20 marks] What is a survey? The goal of a survey is to give a broad, structured overview of a specific area. For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks. A survey is different from a set of paper summaries. The survey should focus on presenting the “big picture” using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal. Deliverable You should submit a written version of your survey. The length should be from 1000 to 2000 words (about 3-5 pages), not including references. There is no strict template to be followed for this report. However, you may use the following- abstract/executive summary, importance of your security issue, state-of-the art, how the researchers are addressing the issue, which direction the research is going, the probable future research direction, conclusion/your comments, and references. Rationale To demonstrate your understanding of: o wireless networks terminology and technology; o planning and performing wireless network site survey; o wireless network security; o emerging mobile network technologies; o research skills; o Provide citation and referencing based on CSU guidelines Main text : will provide pdf files. Jorge, L. O. (2014). Guide to Wireless Communications (3rd ed.). Cengage Learning. ISBN: 978-1-111-30731-8 Recommended reading / resources • Bikos, A. N., Sklavos, N. (2012, March). LTE/SAE Security Issues on 4G Wireless Networks. IEEE Security & Privacy, 11(2), 55-62. doi: 10.1109/MSP.2012.136 • Zia, T., Zomaya, A. (2006, October). Security Issues in Wireless Sensor Networks. International Conference on Systems and Networks Communications (ICSNC '06), doi: 10.1109/ICSNC.2006.66 • Siddiqui, M. S., Choong, S. H. (2007, April). Security Issues in Wireless Mesh Networks. International Conference on Multimedia and Ubiquitous Engineering (MUE '07), pp.717-722. doi: 10.1109/MUE.2007.187 • Gupta, M., Malhotra, S. (2010, October). Comparison of security issues in wireless networks. 2nd International Conference on Software Technology and Engineering (ICSTE), 2(2), pp.130-133. doi: 10.1109/ICSTE.2010.5608835 • Yi-Sheng, S., Shih-Yu, C., Hsiao-Chun, W., Huang, S. C., Hsiao-Hwa, C. (2011, April). Physical Layer Security in Wireless Networks: a Tutorial. IEEE Wireless Communications, 18(2), 66-74. doi: 10.1109/MWC.2011.5751298 • Rongxing, L., Xiaodong, L., Xuemin, S. (2013, March). SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency. IEEE Transactions on Parallel and Distributed Systems, 24(3), 614,624. • Daojing, H., Chun, C., Jiajun, B., Chan, S., Yan, Z. (2013, February). Security and Efficiency in Roaming Services for Wireless Networks: Challenges, Approaches, and Prospects. IEEE Communications Magazine, 51(2), 142-150. doi: 10.1109/MCOM.2013.6461199 • Meng, Z., Anand, R., Niraj, K. J. (2013). Towards Trustworthy Medical Devices and Body Area Networks. The 50th Annual Design Automation Conference (DAC '13). doi: 10.1145/2463209.2488751 • Seth, G., Dariusz, R. K. (2010, January). Reliability and security in wireless networks. SIGACT News 40(4), 86-87. doi: 10.1145/1711475.1711495


Back To Top