Reference no: EM132741573 , Length: word count:4000
CIS4020 Mobile Systems and Cybersecurity - Teesside University
Scenario
AMY Networks is a consultancy business that designs, installs and operates different types of wireless and wired networks for businesses and research organisations. As one of their project leaders you have been asked to respond to an ITT (Invitation to Tender) for this network design. The network solution will include the wireless sensor network logical design along with protocols specifications.
The ITT document is included with this ICA. The tender that you produce in response to the ITT should take the following form.
Part 1 - Design
You need to respond to the ITT with following documents: -
• Logical Design: Wireless sensor network.
o Logical layout of the WSN deployment (You must show the overall connectivity between the different network elements).
o Design an addressing scheme for WSN(for example IPv6 equivalent).
Part 2 - Design Report (4000 words)
The report must provide
• Description for the protocols you have chosen for the wireless sensor network and how they will prolong the network life time (Restrict discussion to Routing, MAC and Physical Layer).
• Enhanced security solution for the network including identification and mitigation of the security risks.
• Conclusion/Reflection:
- Realistic and insightful conclusions drawn from the research.
- A full discussion about the nature of future developments should be included.
The discussion should include a plan for integrating the different network protocols into the new network design. Your discussion must be supported by published research or simulation.
Learning Outcome 1: Appraise the technologies that are used to develop wireless based networks.
Learning Outcome 2: Evaluate and compare the various mechanisms that are used to ensure effective communication between mobile devices and the real-world.
Learning Outcome 3: Demonstrate a comprehensive and critical understanding of the security risks that are associated with a range of mobile devices and formulate suitable strategies for protection of the data held by them.
Learning Outcome 4: Research, assess and evaluate the complex relationships which exist between these technologies in real-world mobile devices.
Learning Outcome 5: Integrate and synthesise diverse knowledge, evidence concepts, theory and practice in wireless communications, to solve problems.
Learning Outcome 6: Critically appraise the networking technologies that are currently used by mobile devices.
Learning Outcome 7: Demonstrate a comprehensive knowledge of the hardware technologies that are currently used by mobile devices.
Part 1- Design
Logical Design To obtain maximum marks you need to :-
• Produce a detailed, documented network diagram in response to the information provided in the ITT. Your design will consist of diagrams for the wireless sensor network
• Your design should clearly show the measures you have included that address the technical requirements. The design document should be professionally presented using a tool such as Visio.
.
Addressing scheme To obtain maximum marks you need to :-
• The design should include a valid network addressing solution along with explanation. The addressing scheme must map to the design diagram and the technical requirements.
Part 2 - Design Report (4000 words)
Protocols
To obtain maximum marks: -
• The report must clearly identify and discuss the relevant protocols and hardware used to design this network and how the protocols meet the requirements in the ITT.
• The report must provide a description for the model, design and all of the decisions that you have made in the process of developing the design and how these are linked to the technical requirements describe in the ITT
Security - To obtain maximum marks: -
• The report must include a discussion on security risk, mitigation and enhancements.
Conclusion and Reflection To obtain maximum marks: -
• The report should include realistic and insightful conclusions drawn from the research. and
- A full discussion about the nature of future developments is included.
Part 3 - Presentation To obtain maximum marks:-
• Ensure all of your documents are word processed or produced using suitable tools.
• Ensure all documents are clear, and easy to read with few errors.
• Use professional presentation methods :-
o Table of contents (where appropriate)
o Version control information
o Supported by diagrams/graphics where appropriate
• Ensure all documents are clearly labelled with your name and the document title.
• All sources of information must be referenced and cited.
Attachment:- Mobile Systems and Cybersecurity.rar
Identify significant and controversial issue
: Identify a significant and controversial issue in the United States. Then choose one of the ten cultural clusters (not Anglo) found in Country
|
Explain your diagnosis for the patient
: Patient HL comes into the clinic with the following symptoms: nausea, vomiting, and diarrhea. The patient has a history of drug abuse and possible Hepatitis C.
|
Calculate the realized rate of return on the bond
: Calculate the realized rate of return on the bond knowing that you bought the bond five years ago, you sold the bond today, you never reinvested the coupons
|
Best for motivating yourself,
: What best practices can you conclude are best for motivating yourself, or peers, on class projects or, employees at your place of employment?
|
Design an addressing scheme for WSN
: Design an addressing scheme for WSN - wireless sensor network and how they will prolong the network life time (Restrict discussion to Routing, MAC and Physical
|
How do journalize the adjusting entry needed at december
: Journalize the adjusting entry needed at December 31. On June 1,when we collected $ 48,000 rent in advance ,we debited Cash and created Unearned
|
How might freud four personality types
: How might Freud's (and Fromm's) four personality types differ (in today's environment) of how they use social networking sites?
|
Determine the double-decliningbalance rate
: An estimated useful life of 50 years. Determine (a) the double-decliningbalance rate and (b) the double-declining-balance depreciation for the first year
|
What do you think is most useful for administration
: Comment your favorite scripting language (VBScript, Node.Js, Python or SQL script). What do you think is most useful for administration and security?
|