INVESTIGATE ON THE EMERGINGWIRELESS NETWORKS AND SECURITY CHALLENGES ASSOCIATED WITH THESE NETWORKS
The primary theme of the paper is INVESTIGATE ON THE EMERGINGWIRELESS NETWORKS AND SECURITY CHALLENGES ASSOCIATED WITH THESE NETWORKS in which you are required to emphasize its aspects in detail. The cost of the paper starts from $109 and it has been purchased and rated 4.9 points on the scale of 5 points by the students. To gain deeper insights into the paper and achieve fresh information, kindly contact our support.
Assignment Description:
In consultation with your tutor, you need to choose a topic out of three to prepare a research report about it. Use the instructions within the topic to prepare the report. The objective of this assignment is to improve your knowledge on the cutting edge wireless technologies and your critical thinking about them. The assignment will also increase your knowledge with regards to practical implementation of those technologies in an enterprise setting.
Topic I (100 marks)
Investigate on the opportunities and challenges (including security) related withcloud-managed wireless networks and compile a brief report of around 1400 words. Your references may come from websites, white papers, government documents or published conference or journal papers.
Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (in addition to table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use IEEE style of referencing for the list of references and in-text references. The report should include key topics shown in Table 1that also shows marks allocated for the topics.
SN
|
Topic
|
Marks
|
1
|
Introduction
|
10
|
2
|
Architectures and standards
|
25
|
3
|
Opportunities and challenges
|
20
|
4
|
Examples and case studies
|
20
|
5
|
Any other key relevant information
|
10
|
6
|
Conclusion (A well written coherent conclusion) / Viva-voce
|
10
|
7
|
References (Adhered to IEEE style) / Viva-voce
|
5
|
Table 1: Key topics versus marks for topic I
TopicII (100 marks)
Investigate on the emergingwireless networks and security challenges associated with these networks and compile a brief report of around 1400 words. Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of wireless networks, associated challenges and protocols as well as any other relevant information on such networks. Please ensure that you understand the emerging wireless network first before you undertake your literature research.
Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (in addition to table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use IEEE style of referencing for the list of references and in-text references.The report should include key topics shown in Table 2 that also shows marks allocated for the topics.
SN
|
Topic
|
Marks
|
1
|
Introduction
|
10
|
2
|
Emerging wireless networks
|
25
|
3
|
Associated security challenges
|
20
|
4
|
Examples and case studies
|
20
|
5
|
Any other key relevant information
|
10
|
6
|
Conclusion (A well written coherent conclusion)/ Viva-voce
|
10
|
7
|
References (Adhered to IEEE style)/ Viva-voce
|
5
|
Table 2: Key topics versus marks for topic II
TopicIII (100 marks)
Investigate on the influence ofMIMO technology on wireless networksand prepare a brief report of around 1400 words. Your references may come from websites, white papers, government documents or published conference or journal papers. Your report should include brief descriptions of given points below. Please ensure that you understand the term MIMO technology and wireless networks first before you undertake your literature research.
Your report should include only the body (about 1200 words), conclusion (about 200 words) and the reference list (in addition to table of contents and introduction). Use the sub-headings given in the template and include in-text references in the body of the report. Use IEEE style of referencing for the list of references and in-text references.The report should include key topics shown in Table 3 that also shows marks allocated for the topics.
SN
|
Topic
|
Marks
|
1
|
MIMO technology
|
10
|
2
|
Legacy technologies before MIMO
|
25
|
3
|
Use of MIMO in various wireless networks
|
20
|
4
|
Examples and case studies
|
20
|
5
|
Any other key relevant information
|
10
|
6
|
Conclusion (A well written coherent conclusion)/ Viva-voce
|
10
|
7
|
References (Adhered to IEEE style)/ Viva-voce
|
5
|
Table 3: Key topics versus marks for topic III
Marking Criteria:
Marks are allocated as indicated on each question, taking the following aspects into account:
Aspects
|
Description
|
Evaluation
|
Explain the use of the technique
|
Explanation
|
Description/explain how to use the technique
|
Report structure
|
Inadequate structure, careless presentation, poor writing
|
Reference style (IEEE)
|
Proper referencing if required
|
Plagiarism
|
Copy from another student, copy from internet source/textbook, copy from other sources without proper acknowledgement
|
Marking Rubric for Exercise Answers
Grade
Mark
|
HD
80%+
|
D
70%-79%
|
CR
60%-69%
|
P
50%-59%
|
Fail
< 50%
|
|
Excellent
|
Very Good
|
Good
|
Satisfactory
|
Unsatisfactory
|
Evaluation
|
Logic is clear and easy to follow with strong arguments
|
Consistency logical and convincing
|
Mostly consistent and convincing
|
Adequate cohesion and conviction
|
Argument is confused and disjointed
|
Sophistication and effectivity
|
The presented solution demonstrated an extreme degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a high degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated an average degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a low degree of sophistication and effectivity to secure and/or manage WLAN
|
The presented solution demonstrated a poor degree of sophistication and effectivity to secure and/or manage WLAN.
|
Explanation
|
All elements are present and well integrated.
|
Components present with good cohesion
|
Components present and mostly well integrated
|
Most components present
|
Lacks structure.
|
Reference style
|
Clear styles with excellent source of references.
|
Clear referencing/ style
|
Generally good referencing/style
|
Unclear referencing/style
|
Lacks consistency with many errors
|
Report structure and report presentation
|
Proper writing. Professionally presented
|
Properly written, with some minor deficiencies
|
Mostly good, but some structure or presentation problems
|
Acceptable presentation
|
Poor structure, careless presentation
|
100% Plagiarism Free & Custom Written
Tailored to your instructions