MN603: Wireless Networks and Security

Assessment Details and Submission Guidelines

Trimester T1 2019
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type

Individual Assignment 1

Assessment
Title

Wireless networks performance evaluation

Purpose of the
assessment
(with ULO
Mapping)

The purpose of the assignment is to compare the wireless communication
technologies and evaluate their performance. Students will be able to complete
the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Weight 10%
Total Marks 60
Word limit 1500 – 2000 words
Submission
Guidelines

 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:

http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment

Academic
Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:

http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity

Section in your Unit Description.

MN603 Wireless Networks and Security Page#2 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Assignment Description
Wireless networks performance varies from wired networks, the latter uses a guided medium and
wireless networks use unguided medium for transmission. To design and simulate wireless networks
the network simulator – 2 (NS – 2), an open source discreet event simulator could be used. The NS-2
simulator is a widely used simulation tool, which could generate trace files for analysis and comes
with a network animator to visualize the network performance.
This assessment requires students to compare and evaluate the performance of wireless routing
protocols using the NS-2. The assessment requires students to design a wireless network topology in
NS-2 and evaluate the generated trace files for two different wireless routing protocols. The students
are required to carry out a critical analysis of the results of the two routing protocols, by plotting
graphs and discussing the outcomes.

The students are required to:
 Design a wireless network consisting of 20 nodes; the dimensions for the given topology are
400×300. The agent type should be UDP and the traffic CBR. The simulation should run for
300 seconds. Uniform deployment of nodes is required and the nodes are required to
transmit packets over the network. The wireless node configuration should include the NS-2
energy model.

 Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA.
Critically analyse the trace files in terms of packets sent, received, dropped and energy
consumed. These parameters should be plotted on graphs and discussed in detail

 Include screenshots of the NAM displaying the nodes uniformly deployed during the
simulation and add at least 3 screen shots of the simulation.

 Appendix I should include the tcl srcript used in each simulation.

MN603 Wireless Networks and Security Page#3 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Marking criteria:
Section to be included in
the report

Description of the section Marks
Introduction Outline of the report ( in 3-4 sentences) 4
Report Layout Report layout, style and language 5
Network Design The network topology shown in the NAM 5
Simulation Three simulation screen shots for each routing
protocol at 50s, 150s and 250s simulation time with
description of the ongoing events.

12

Trace file analysis Provide a critical analysis of the two trace files in terms of

packets sent, received, dropped and energy
consumption.

8

Results Plot the graphs for packets sent, received, dropped and

energy consumption for the two protocols.

8
Conclusion Write summary of the report 4
Reference style Follow IEEE reference style 4
Appendix 1 The tcl files for each routing protocol 10
Total 60

Marking Rubric for Assignment #1: Total Marks 60
Grade
Mark

HD
80% -100%

DI
70% – 79%

CR
60 – 69%

P
50% – 59%

Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory

Introduction
/4
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated

Topics are
relevant and
soundly
analysed.

Generally
relevant and
analysed.

Some relevance
and briefly
presented.

This is not
relevant to the
assignment
topic.

Report Layout
/5
Exceptional report
layout, style and
language used

Very good
report
layout, style
and
language
used

Good report
layout, style
and language
used

Acceptable
report layout,
style and
language used.

Poor report
layout, style
and language
used.

Network Design

/5
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
requirements

Demonstrat
ed good
ability to
think
critically and
present an
exceptional
design
considering
all the
requirement
s

Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
requirements.

Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.

MN603 Wireless Networks and Security Page#4 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Simulation
/12

Excellent screen
shot of the
uniformly
deployed nodes

Very good
screen shot
of the
uniformly
deployed
nodes

Good screen
shot of the
uniformly
deployed
nodes

Screen shot of
the uniformly
deployed
nodes.

Failed to
provide a
screenshot of
the uniformly
deployed nodes

Trace file
analysis
/8
Excellent analysis
of the trace files.
covered all
aspects.

Very Good
analysis of
the trace
files

Good analysis
of trace files

Some analysis
provided of
trace files

Lacking analysis
of trace files

Results

/8
Excellent graphs
well labelled and
clear

Very Good
graphs well
labelled and
clear

Good graphs
well labelled
and clear

Graphs not well
labelled and
clear

Failed to
provide graphs

Conclusion
/4
Logic is clear and
easy to follow with
strong arguments

Consistency
logical and
convincing
Mostly
consistent
logical and
convincing

Adequate
cohesion and
conviction

Argument is
confused and
disjointed

Reference style
/4
Clear styles with
excellent source of
references.

Clear
referencing
style

Generally good
referencing
style

Sometimes
clear
referencing
style

Lacks
consistency
with many
errors

Appendix 1
/10

The tcl files were
well commented

The tcl files
were
complete
and missing
a few
comments

The tcl files
were complete
with some
comments

The tcl files
were missing
comments

The tcl files
were missing

or ORDER A CUSTOM PAPER

Category:

Description

MN603: Wireless Networks and Security

Assessment Details and Submission Guidelines

Trimester T1 2019
Unit Code MN603
Unit Title Wireless Networks and Security
Assessment
Type

Individual Assignment 1

Assessment
Title

Wireless networks performance evaluation

Purpose of the
assessment
(with ULO
Mapping)

The purpose of the assignment is to compare the wireless communication
technologies and evaluate their performance. Students will be able to complete
the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

Weight 10%
Total Marks 60
Word limit 1500 – 2000 words
Submission
Guidelines

 All work must be submitted on Moodle by the due date along with a
completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body)
font and 2 cm margins on all four sides of your page with appropriate section
headings.
 Reference sources must be cited in the text of the report, and listed
appropriately at the end in a reference list using IEEE referencing style.
Extension  If an extension of time to submit work is required, a Special Consideration
Application must be submitted directly on AMS. You must submit this
application three working days prior to the due date of the assignment.
Further information is available at:

http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/specialconsiderationdeferment

Academic
Misconduct

 Academic Misconduct is a serious offence. Depending on the seriousness of
the case, penalties can vary from a written warning or zero marks to exclusion
from the course or rescinding the degree. Students should make themselves
familiar with the full policy and procedure available at:

http://www.mit.edu.au/about-mit/institute-publications/policies-
procedures-and-guidelines/Plagiarism-Academic-Misconduct-Policy-
Procedure. For further information, please refer to the Academic Integrity

Section in your Unit Description.

MN603 Wireless Networks and Security Page#2 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Assignment Description
Wireless networks performance varies from wired networks, the latter uses a guided medium and
wireless networks use unguided medium for transmission. To design and simulate wireless networks
the network simulator – 2 (NS – 2), an open source discreet event simulator could be used. The NS-2
simulator is a widely used simulation tool, which could generate trace files for analysis and comes
with a network animator to visualize the network performance.
This assessment requires students to compare and evaluate the performance of wireless routing
protocols using the NS-2. The assessment requires students to design a wireless network topology in
NS-2 and evaluate the generated trace files for two different wireless routing protocols. The students
are required to carry out a critical analysis of the results of the two routing protocols, by plotting
graphs and discussing the outcomes.

The students are required to:
 Design a wireless network consisting of 20 nodes; the dimensions for the given topology are
400×300. The agent type should be UDP and the traffic CBR. The simulation should run for
300 seconds. Uniform deployment of nodes is required and the nodes are required to
transmit packets over the network. The wireless node configuration should include the NS-2
energy model.

 Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA.
Critically analyse the trace files in terms of packets sent, received, dropped and energy
consumed. These parameters should be plotted on graphs and discussed in detail

 Include screenshots of the NAM displaying the nodes uniformly deployed during the
simulation and add at least 3 screen shots of the simulation.

 Appendix I should include the tcl srcript used in each simulation.

MN603 Wireless Networks and Security Page#3 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Marking criteria:
Section to be included in
the report

Description of the section Marks
Introduction Outline of the report ( in 3-4 sentences) 4
Report Layout Report layout, style and language 5
Network Design The network topology shown in the NAM 5
Simulation Three simulation screen shots for each routing
protocol at 50s, 150s and 250s simulation time with
description of the ongoing events.

12

Trace file analysis Provide a critical analysis of the two trace files in terms of

packets sent, received, dropped and energy
consumption.

8

Results Plot the graphs for packets sent, received, dropped and

energy consumption for the two protocols.

8
Conclusion Write summary of the report 4
Reference style Follow IEEE reference style 4
Appendix 1 The tcl files for each routing protocol 10
Total 60

Marking Rubric for Assignment #1: Total Marks 60
Grade
Mark

HD
80% -100%

DI
70% – 79%

CR
60 – 69%

P
50% – 59%

Fail
<50%
Excellent Very Good Good Satisfactory Unsatisfactory

Introduction
/4
All topics are
pertinent and
covered in depth.
Ability to think
critically and
source material is
demonstrated

Topics are
relevant and
soundly
analysed.

Generally
relevant and
analysed.

Some relevance
and briefly
presented.

This is not
relevant to the
assignment
topic.

Report Layout
/5
Exceptional report
layout, style and
language used

Very good
report
layout, style
and
language
used

Good report
layout, style
and language
used

Acceptable
report layout,
style and
language used.

Poor report
layout, style
and language
used.

Network Design

/5
Demonstrated
excellent ability to
think critically and
present an
exceptional design
considering all the
requirements

Demonstrat
ed good
ability to
think
critically and
present an
exceptional
design
considering
all the
requirement
s

Demonstrate d
good ability to
think critically
and present a
good design
considering all
the
requirements.

Demonstrated
ability to think
critically and
present a design
Did not
demonstrate
ability to think
critically and
present a
design.

MN603 Wireless Networks and Security Page#4 of 4

Prepared by: Dr Javed Ali Baloch Moderated by: Dr Sanjeeb Shrestha April, 2019
Simulation
/12

Excellent screen
shot of the
uniformly
deployed nodes

Very good
screen shot
of the
uniformly
deployed
nodes

Good screen
shot of the
uniformly
deployed
nodes

Screen shot of
the uniformly
deployed
nodes.

Failed to
provide a
screenshot of
the uniformly
deployed nodes

Trace file
analysis
/8
Excellent analysis
of the trace files.
covered all
aspects.

Very Good
analysis of
the trace
files

Good analysis
of trace files

Some analysis
provided of
trace files

Lacking analysis
of trace files

Results

/8
Excellent graphs
well labelled and
clear

Very Good
graphs well
labelled and
clear

Good graphs
well labelled
and clear

Graphs not well
labelled and
clear

Failed to
provide graphs

Conclusion
/4
Logic is clear and
easy to follow with
strong arguments

Consistency
logical and
convincing
Mostly
consistent
logical and
convincing

Adequate
cohesion and
conviction

Argument is
confused and
disjointed

Reference style
/4
Clear styles with
excellent source of
references.

Clear
referencing
style

Generally good
referencing
style

Sometimes
clear
referencing
style

Lacks
consistency
with many
errors

Appendix 1
/10

The tcl files were
well commented

The tcl files
were
complete
and missing
a few
comments

The tcl files
were complete
with some
comments

The tcl files
were missing
comments

The tcl files
were missing

MN603: Wireless Networks and Security

or ORDER A CUSTOM PAPER