MN603 Wireless Networks and Security – Best Writing Service

Assessment Details and Submission Guidelines
Trimester
T2 2019
Unit Code

Unit Title
and
AssessmentType
Individual Assignment 1
AssessmentTitle
Evaluation of 5G Network and the Security
Purpose of theassessment(with ULOMapping)
The purpose of the assignment is to compare the 5G wireless communicationtechnology with the current technologies in the literature and evaluate the 5Gnetwork security. Students will be able to complete the following ULOs:a. Compare standards-based technologies used in various networks;b. Test and evaluate various wireless networks performance;
Weight
10%
Total Marks
70
Word limit
1800 – 2300 words
Due Date
Week 7, 1/9/2019 11:55PM
SubmissionGuidelines
 All work must be submitted on Moodle by the due date along with acompleted Assignment Cover Page. The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)font and 2 cm margins on all four sides of your page with appropriate sectionheadings. Reference sources must be cited in the text of the report, and listedappropriately at the end in a reference list using IEEE referencing style.
Extension
 If an extension of time to submit work is required, a Special ConsiderationApplication must be submitted directly on AMS. You must submit thisapplication three working days prior to the due date of the assignment.Further information is available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/specialconsiderationdeferment
AcademicMisconduct
 Academic Misconduct is a serious offence. Depending on the seriousness ofthe case, penalties can vary from a written warning or zero marks to exclusionfrom the course or rescinding the degree. Students should make themselvesfamiliar with the full policy and procedure available at:http://www.mit.edu.au/about-mit/institute-publications/policiesprocedures-and-guidelines/Plagiarism-Academic-Misconduct-PolicyProcedure. For further information, please refer to the Academic IntegritySection in your Unit Description.
Australian Expert Writers
MN603 Wireless Networks and Security Page#2 of 4Prepared by: Dr Saeid Iranmanesh Moderated by: Dr Sanjeeb Shrestha July, 2019Assignment Description5G is the newest mobile network technology that is replacing the current 4G technology by providinghigh data rate, reduced latency, energy saving, cost reduction, higher system capacity, and massivedevice connectivity. Mobile providers are planning to immigrate to this technology to supportthe growing number of devices that demand internet access, many of them requiring somuch bandwidth in order to function normally that 4G simply doesn’t cut it anymore.For further reading, refer to the article “5G Cellular User Equipment: From Theory to PracticalHardware Design” [1]. The article is available on the IEEE Explore platform, which could be accessedvia the Melbourne Institute of Technology Library.The assessment requires the students to identify the challenges in 5G technology compare with thecurrent wireless communication technologies and consider the proposed solutions to address the 5Glimitations. Evaluate the wireless communication standards for wireless cyber physical systems andinternet of things. The students are required to submit a report, which includes:1. Comparison of the existing cellular networks generations (5G, 4G, 3G, and 2G) in terms of:a. Communication spectrumb. modulation techniquesc. medium access control mechanismd. Network speed and bandwidth utilizatione. Security techniques and risk2. Explore the architecture of a 5G network3. Identify and analyse the 5G attacks on the access and core networks.4. Identify and analyse the issue related to 5G network coverage? What is a solution to addressthis limitation?References
[1]
Y. Huo, X. Dong, and W. Xu, “5G Cellular User Equipment: From Theory to Practical HardwareDesign ” in IEEE Access, vol. 5, pp. 13992 – 14010, 2017.
MN603 Wireless Networks and Security Page#3 of 4Prepared by: Dr Saeid Iranmanesh Moderated by: Dr Sanjeeb Shrestha July, 2019Marking criteria:
Section to be included inthe report
Description of the section
Marks
Introduction
Outline of the report ( in 5-6 sentences)
5
Motivation
You need to motivate the reader why 5G?
5
Comparison of cellularnetworks
Comparison of the existing cellular networksgenerations in terms of:a. Communication spectrumb. modulation techniquesc. medium access control mechanismd. Network speed and bandwidthutilizatione. Security techniques and risk
20
5G Architecture
Explore the 5G architecture
10
Identification andAnalysis of 5G Attacks
Identify and analyse the attack with highest criticality.Justify your selection with valid reasoning and explainthe countermeasures taken to address such attack.
10
Identification andAnalysis of 5G limitationin network coverage
Identify and analyse the issue related to 5G networkcoverage. Justify the reasons and explain a solutiontaken to address such limitation
10
Conclusion
Write summary of the report
5
Reference style
Follow IEEE reference style
5
Total
70
Marking Rubric for Assignment #1: Total Marks 70
GradeMark
HD48-60
DI42-47
CR36-41
P30-35
Fail<30
Excellent
Very Good
Good
Satisfactory
Unsatisfactory
Introduction/5
All topics arepertinent andcovered in depth.Ability to thinkcritically andsource material isdemonstrated
Topics arerelevant andsoundlyanalysed.
Generallyrelevant andanalysed.
Some relevanceand brieflypresented.
This is notrelevant to theassignmenttopic.
Motivation/5
Exceptionalmotivation
Very goodmotivation
Goodmotivation
Acceptablemotivation
Poormotivation
Comparison ofcellularnetworks/20
Finding is clearlylinked and welljustified
Finding isclearlylinked andjustified
Finding islinked andconvincing
Finding is notlinked andunjustified
Finding is notavailable
5G Architecture/10
Excellentunderstanding of5G Architecture
Very goodunderstandi
Goodunderstanding
Demonstratedadequateunderstanding
Poorunderstanding
MN603 Wireless Networks and Security Page#4 of 4Prepared by: Dr Saeid Iranmanesh Moderated by: Dr Sanjeeb Shrestha July, 2019
ng of 5GArchitecture
of 5GArchitecture
of 5GArchitecture
of 5Garchitecture
Evaluation of5G Attacks onaccess and corenetworks/10
Exceptionalevaluation of 5Gattacks on accessand core networks
Very goodevaluationof 5Gattacks onaccess andcorenetworks
GoodEvaluation of5G attacks onaccess and corenetworks
Good Evaluationof a few 5Gattacks onaccess and corenetworks
Unable toevaluate 5Gattacks onaccess and corenetworks
Identificationand Analysisof 5Glimitation innetworkcoverage/10
Exceptionalevaluation of 5Gnetwork coverage
Very goodevaluationof 5Gnetworkcoverage
Goodevaluation of5G networkcoverage
Satisfactoryevaluation of 5Gnetworkcoverage
Failed, toevaluate 5Gnetworkcoverage issue
Conclusion/5
Logic is clear andeasy to follow withstrong arguments
Consistencylogical andconvincing
Mostlyconsistentlogical andconvincing
Adequatecohesion andconviction
Argument isconfused anddisjointed
Reference style/5
Clear styles withexcellent source ofreferences.
Clearreferencingstyle
Generally goodreferencingstyle
Sometimesclearreferencingstyle
Lacksconsistencywith manyerrors

Assignment status: Already Solved By Our Experts

(USA, AUS, UK & CA  PhD. Writers)