MN603 Wireless Networks and Security

Order now

 

The purpose of the assignment is to compare the wireless communication technologies and evaluate their performance. Students will be able to complete the following ULOs:
b. Compare standards-based technologies used in various networks;
c. Test and evaluate various wireless networks performance;

1500 – 2000 words

Submission Guidelines
 All work must be submitted on Moodle by the due date along with a completed Assignment Cover Page.
 The assignment must be in MS Word format, 1.5 spacing, 11-pt Calibri (Body) font and 2 cm margins on all four sides of your page with appropriate section headings.
 Reference sources must be cited in the text of the report, and listed appropriately at the end in a reference list using IEEE referencing style.

 

Assignment Description
Wireless networks performance varies from wired networks, the latter uses a guided medium and
wireless networks use unguided medium for transmission. To design and simulate wireless networks
the network simulator – 2 (NS – 2), an open source discreet event simulator could be used. The NS-2
simulator is a widely used simulation tool, which could generate trace files for analysis and comes
with a network animator to visualize the network performance.
This assessment requires students to compare and evaluate the performance of wireless routing
protocols using the NS-2. The assessment requires students to design a wireless network topology in
NS-2 and evaluate the generated trace files for two different wireless routing protocols. The students
are required to carry out a critical analysis of the results of the two routing protocols, by plotting
graphs and discussing the outcomes.
The students are required to:
 Design a wireless network consisting of 20 nodes; the dimensions for the given topology are
400×300. The agent type should be UDP and the traffic CBR. The simulation should run for
300 seconds. Uniform deployment of nodes is required and the nodes are required to
transmit packets over the network. The wireless node configuration should include the NS-2
energy model.
 Run the simulation on two different routing protocols such as DSDV, AODV, DSR, and TORA.
Critically analyse the trace files in terms of packets sent, received, dropped and energy
consumed. These parameters should be plotted on graphs and discussed in detail
 Include screenshots of the NAM displaying the nodes uniformly deployed during the
simulation and add at least 3 screen shots of the simulation.
 Appendix I should include the tcl srcript used in each simulation

Leave a Comment