Network Essay

1610 words - 7 pages

TWS2571 T2 2013/2014 Assignment (15%)
1. Deadline   Due Date Phase 1: 6th December 2013, 1130 am Due Date Phase 2: 30th December 2013, 1130 am.

2. Group This is a group assignment, group of FOUR. STRICTLY NO COPYING, if detected all parties involved will get 0 marks. Report is needed to pass the plagiarism test before submission (Turnitin). All reports must have less than 10% of similarity index. Note: Name your report with the given assignment ID before uploading. Penalty of 3 marks for failing to comply. 3. Task You have the option to choose a non research or research based assignment question. However, only 2 groups (Maximum) per question, please register with me ASAP. (First come ...view middle of the document...

The retrieval data should be kept and utilized by a hosting server. Users read the data (in graph format) from the hosting server. Source code for BT sensor tag is partially provided but modifications are needed. (Source: CC2541 SensorTag Software @
User  Mobile  phone  (View)  User  Mobile  phone  (View) 

BT   Sensor  Tag 

Mobile  phone  (Hosting) 

i. Android (Limited to 4 groups only) Note: Only Sensor Tag shall be provided. You are required to do a comprehensive study on the related sensor or server hosting for mobile. Three literature studies are needed to compare with your system, including the similarities and differences. Phase 1: hosting & data server storage + literature reviews Phase 2: Complete solution on BT Sensor Tag + hosting

Simulation Based Assignment
i. LTE a. NS 2/ NS3 1) 2) 3) 4) 5) b. LTE-Sim 1)

Downlink Schedulers Uplink Schedulers Bandwidth Request mechanisms Bandwidth Allocation Security Bandwidth Request mechanisms

2) 3) ii. IEEE 802.16 a. NS 2/ NS3 1) 2) 3) 4) 5) iii. MANET a. NS 2/ NS 3 1) 2) b. OMNET++ 1) 2) iv. IEEE 802.11 a. NS 2/ NS 3 1) 2) b. OMNET ++ 1) 2)

Bandwidth Allocation Security

Downlink Schedulers Uplink Schedulers Bandwidth Request mechanisms Bandwidth Allocation Security

Routing Protocols Security Routing Protocols Security

Bandwidth Request mechanisms Bandwidth Allocation/Estimation Bandwidth Request mechanisms Bandwidth Allocation/Estimation

v. Wireless Sensor Network a. NS 2/ NS3 (Limited to 4 groups only) b. OMNET++ (Limited to 4 groups only) Find 3 latest journal publications (2008-2013) based on the wireless access technologies above and conduct a thorough literature review. Rewrite the ideas/findings of the 3 selected journals. Please ensure the performance results (throughput, average delay, efficiency and etc) in the journal are obtained in your simulation. Phase 1: Simulate several scenarios, simulation parameters use + literature reviews Phase 2: Identify the source code/framework/module to be changed. Understand how the source code/framework/module works. Simulation results and discussions. Note: 30% extra bonus marks if you able to transform the idea/finding from your literature review to simulation tool. You must able pass Q&A session.

4. Proposal You are required to submit a assignment proposal by 11am on 6th November 2013 for approval. Any proposal without the lecturer’s approval is considered void. You should have the following in your proposal:     Name and ID Group ID Task Title List of 3 literature studies (for non research based –name of the software and URL/link; for research based - authors, publication year, page number, article title, journal title and volume number: IEEE references style) Highlight the selected journal that you will demonstrate at the end of the assignment. (for research topic Wireless Sensor Network Only)

Note: No changes are allowed after approval granted. You are advised...

Other assignments on Network

Network Technologies Essay

1054 words - 5 pages Network Topologies are in essence the way the network is laid out as it relates to the devices that are connected to it. If you could view all the devices connected to the network, the arrangement would suggest which type the network topology it falls within. The topologies can be described as either a physical or logical design in their defined layout. Network topologies are grouped in the following design categories, Mesh, Bus, Ring and Star

Network Security Essay

1065 words - 5 pages EXECUTIVE SUMMARY Selective forwarding or dropping of packets is a serious threat to multi hop communication in a Wireless Sensor Network (WSN). There are various schemes to induce cooperation in a WSN to overcome this problem. In this paper, we have introduced a novel adversary model and have proposed an incentive based scheme to inspire cooperation among nodes in a Geometric Structure based WSN. The scheme has been formally analyzed. The

Network Engineer

301 words - 2 pages in the wrong hands because my company could get sued for not having the proper security for their systems. All of the customers equipment is locked up separated and segregated from our internal network. We hire a third party to do security audit to help keep up with the security precautions. IT Asset Description | Seven Domains of Typical IT | Privacy Data Impact | Assessment[Critical-Major-Minor] | User Passwords | Workstation Domain | User

Network Mergers Proposal

427 words - 2 pages Network Merger Proposal Question 1- Opening Statement Prepare an opening statement that specifies your organization’s capabilities to manage a deployment of this size. We are a mid size Network consulting outfit that specializes in LAN configuration, Inter - LAN routing designing, topology designs, VLAN configurations. Our team consists of experts who are CCIE qualified

Integrative Network Design

2910 words - 12 pages Integrative Network Design NTC 362 Integrative Network Design This project will consist of five different phases totaling a timeline of six months. The first month will be the planning phase. This phase will have a deadline no longer than 30 days. After the first 30 days, the second phase will take into effect, which is the installation phase. This phase will also have a timeline of no more than 30 days. The Third Phase will be the

Virtual Network Design

1703 words - 7 pages Project 2: Virtual Network Design Jaime Galena ITCS-408 Mr. Shu 12-12-14 Western Dynamics is a midsized specialty manufacturing company. They have decided that a virtualized environment would help reduce costs and provide for a smaller carbon foot print. As the company’s first step in this direction, they have decided to move two of their current physical domain controllers into a

Network Attached Storage

497 words - 2 pages NAS NAS devices are connected to the LAN as an independent network device and assigned an IP address. The primary advantage of NAS devices is that network storage is no longer limited to the storage capacity of a computing device or the number of disks in a local server. Many NAS products can hold enough disks to support RAID, and multiple NAS appliances can be attached to the network for storage expansion. There are many different types of NAS

Wireless Network Proposal

664 words - 3 pages the possibility that someone could intercept it. Another risk is potential malfunctions or network issues. With all of our equipment being networked wirelessly, if the network goes down so will all of our functions. That would render our associates basically useless. Conclusion Party Plates is in a great position to grow within the market. By taking advantage of some technological advances we can do just that. Even though there is some

Roles Involved In Network Security

430 words - 2 pages , anniversary, etc.). I could pose as an outside contractor that just happen to have lost its private key accidentally and need to access the system through one of the company computers connected to the network. 2. Using social engineering by offering to send the postcard by email (attachment) containing the invitations to the manager’s birthday party and the need to confirm their attendance by replaying back through their email addresses

Network Security And Ethical Hacking

5261 words - 22 pages Network Security & Ethical Hacking ------------------------------------------------- ------------------------------------------------- Neal Patrick and his friends did not realise they were doing anything unethical, in fact: when asked by Congress “At what point he questioned the ethics of his actions” – he answered “Once the FBI knocked upon my door.” “I have found that inadequate network security is usually caused by a failure to

Network, Telecommunications, And Wireless Computing

1105 words - 5 pages Network, Telecommunications, and wireless computing When we think about marketing, we must consider internet and mobile marketing. Most of young generation has the latest mobile technology, such as laptop, IPhone or blackberries.. Telecommunication system enables transmissions of data over public or private network…business can benefit from today’s modern network infrastructures that provide reliable global reach to employees and customers

Similar Documents

Network Essay

2593 words - 11 pages from the network is okay AUS(config-if)#clock rate 64000 AUS(config-if)#no shutdown 9. Starting from the global configuration router prompt, list the three commands, including the router prompt, necessary to configure and fully activate the Fast Ethernet interface on AUS. AUS(config)#interface FastEthernet 0/0 AUS(config-if)#ip address AUS(config-if)#no shutdown 10. Challenge: What are the two commands you

Network Topology Essay

326 words - 2 pages Hierarchical star topology is where all computers are connected to a single, centrally located point. The central point is usually a hub of servers and switches located in the main equipment room. If there is a problem with the central hub then the network will not be able to work. It can bring the whole system down. By having everything centralize, it makes troubleshooting and reconfiguration simpler. It is usually a home networks that

Network Infrastructure Essay


Network Eval Essay

778 words - 4 pages In a computer network evaluation it is important to cover various areas to determine which are satisfactory and which are in need of improvement. The following evaluations will be used to access the current state of the network: 1. Evaluation of Client Computer Hardware In the evaluation of client computer hardware, this evaluation seeks to identify all client computer assets owned by the company. All laptops and desktops owned by the