Compare wireless communication technologies

Assignment Help Management Information Sys
Reference no: EM132100752

Assignment Description

The long-term evolution (LTE)/LTE-advanced (LTE-A) provides advanced services with higher bandwidths, better spectrum efficiency and lower latency compared to the legacy cellular networks. The LTE/LTE-A is an all IP-based architecture, which makes it vulnerable to new security threats. In order to evaluate the performance of LTE/LTE-A networks, an understanding of the architecture and security threats is essential.

For further reading, could refer to the article "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey" [1]. The article is available on the IEEE Explore platform, which could be accessed via the Melbourne Institute of Technology Library.

The assessment requires the students to compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.

The students are required to submit a report, which includes:

1. Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

2. Explore the architecture of LTE/LTE-A

3. Evaluate the LTE/LTE-A attacks on the access and core networks.

4. Identify and analyse the attack with highest criticality, and explain the countermeasures taken to address such attack.

References

[1] L. He, Z. Yan and M. Atiquzzaman, "LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey," in IEEE Access, vol. 6, pp. 4220-4242, 2018.

Please add these Section to be included in the report:

1. Introduction: Outline of the report.

2. Report Layout: Report layout, style and language.

3. Comparison of cellular networks: Comparison of the existing cellular networks generations in terms of:

a. Communication spectrum

b. modulation techniques

c. medium access control mechanism

d. Network speed and bandwidth utilization

e. Security techniques and risk

4. LTE/LTE-A Architecture: Explore and draw the LTE/LTE-A architecture.

5. Evaluation of LTE/LTE-A Attacks on access and core networks : Evaluation of LTE/LTE-A Attacks on access and core networks. Evaluation is required to be conclusive.

6. Identification and Analysis: Identify and analyse the attack with highest criticality. Justify your selection with valid reasoning and explain the countermeasures taken to address such attack.

7. Conclusion: Write summary of the report

8. Reference style : Follow IEEE reference style

DOCUMENT FORMAT: The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.

Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

Reference no: EM132100752

Questions Cloud

What are some ways to promote self-determination with client : In doing this, it allowed the clients to build a positive sense of self-efficacy. To the class- what are some ways to promote self-determination with clients?
Construct a query to show the expected payment date : Construct a query to show the expected payment date if invoices are due within 30 days of transaction.
Detailed setup of network devices only for a lan : Local Area Network Design and Setup - Advanced Network Design - Analyse the need for the network for above case study. Investigate and propose a suitable
Find the numbers : Four times the square of the first number increased by the square of the second number is 17. Find the numbers.
Compare wireless communication technologies : Compare wireless communication technologies and evaluate the wireless communication standards for wireless cyber physical systems and internet of things.
Midpoint of the line segment with the given endpoints : State the midpoint of the line segment with the given endpoints. (No work required)
How vpn can be advantageous for securing computer : Discuss how VPN can be advantageous for securing computer communications. Address the issue of VPN security in details as described in section 3.
What challenges does diversity pose for managers : What challenges does diversity pose for managers? What tips can you offer for effective management of a diverse workforce
Comparison of the existing cellular networks generations : Evaluation of LTE/LTE-A Network Security - Wireless Networks and Security - Evaluate the LTE/LTE-A attacks on the access and core networks - Identify

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd