Compare standards-based technologies used in various network

Assignment Help Basic Computer Science
Reference no: EM132294477 , Length: word count:2000

Wireless Networks and Security Assignment - Wireless networks performance evaluation

Purpose of the assessment - The purpose of the assignment is to compare the wireless communication technologies and evaluate their performance. Students will be able to complete the following ULOs:

a. Compare standards-based technologies used in various networks;

b. Test and evaluate various wireless networks performance;

Assignment Description -

Wireless networks performance varies from wired networks, the latter uses a guided medium and wireless networks use unguided medium for transmission. To design and simulate wireless networks the network simulator - 2 (NS - 2), an open source discreet event simulator could be used. The NS-2 simulator is a widely used simulation tool, which could generate trace files for analysis and comes with a network animator to visualize the network performance.

This assessment requires students to compare and evaluate the performance of wireless routing protocols using the NS-2. The assessment requires students to design a wireless network topology in NS-2 and evaluate the generated trace files for two different wireless routing protocols. The students are required to carry out a critical analysis of the results of the two routing protocols, by plotting graphs and discussing the outcomes.

The students are required to:

  • Design a wireless network consisting of 20 nodes; the dimensions for the given topology are 400x300. The agent type should be UDP and the traffic CBR. The simulation should run for 300 seconds. Uniform deployment of nodes is required and the nodes are required to transmit packets over the network. The wireless node configuration should include the NS-2 energy model.
  • Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA. Critically analyse the trace files in terms of packets sent, received, dropped and energy consumed. These parameters should be plotted on graphs and discussed in detail.
  • Include screenshots of the NAM displaying the nodes uniformly deployed during the simulation and add at least 3 screen shots of the simulation.
  • Appendix I should include the tcl srcript used in each simulation.

Section to be included in the report -

1. Introduction - Outline of the report ( in 3-4 sentences)

2. Report Layout - Report layout, style and language

3. Network Design - The network topology shown in the NAM

4. Simulation - Three simulation screen shots for each routing protocol at 50s, 150s and 250s simulation time with description of the ongoing events.

5. Trace file analysis - Provide a critical analysis of the two trace files in terms of packets sent, received, dropped and energy consumption.

6. Results - Plot the graphs for packets sent, received, dropped and energy consumption for the two protocols.

7. Conclusion - Write summary of the report.

8. Reference style - Follow IEEE reference style.

9. Appendix 1 - The tcl files for each routing protocol.

Reference no: EM132294477

Questions Cloud

There are thousands of apps available for iphone : There are thousands of apps available for iphone and android users today. What type of users downloads and uses the Facebook app?
Social interaction in organizational politics : What does it mean when there is high positive online social interaction in organizational politics? Please explain.
Design a language for the problem domain of E-commerce : ITECH5403 Comparative Programming Languages Assignment- Language Design Essay, Federation University Australia. Design language for problem domain of E-commerce
Write a research paper on organizational ethical analysis : Organizational Ethical Analysis Paper. Each student will write a research paper on an organization of his or her choice (5-7 pages minimum).
Compare standards-based technologies used in various network : MN603 Wireless Networks and Security - Melbourne Institute of Technology - compare the wireless communication technologies
Take to help increase the team''s effectiveness : If you were a supervisor in a large corporation and you have just selected eight of your employees to sit on a team to propose a new procedure for the productio
Describe how you would avoid violating copyright : Describe how you would avoid violating copyright and intellectual property laws for the material used on your website. Discuss your plan for ensuring that your.
Identify various organizational retail structures : For this unit's Assignment, please read "Case 2: Franchising in China" on page 165 in Chapter 6 of your text. Then address the checklist items after doing some.
How to apply the dice model framework : Managing change is tough, and part of the problem is there is little agreement on what factors most influence transformation initiatives and execution.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd