Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
Networking Research Review: Latest Trends and Analysis


1.Demonstrate systematic understanding of your knowledge of computer networks and security principles, methods and tools at different layers of abstraction (software, hardware, and integration).

2.Critically analyse, apply and evaluate existing and emerging network principles, security policy to meet specific organizational and environmental requirements and clearly communicate, justify and discuss the solution and their ethical and legal aspects

What am I required to do in this assignment?

Referral task

The referral task (repeat assessment) is based around the original research paper. The requirements of this are re-produced below.

The referral task requires you to take the feedback provided on your original paper, and to address the areas that were not up to standard. You should ensure that the areas for development and clearly addressed, and that you include in the revised report and reflection and outline of the changes you have made.

Assessment scenario

You are required to write a Research Review or commonly known as Survey Paper in the format of IEEE journal papers on a Networking related topic. Review/Survey papers simply compare the work done by others or highlight them for new researchers in the field to use as their starting point. It is recommended that you look for examples of Review/Survey papers on the LRC and IEEE Xplore digital libraries. A sample paper can also be found on BREO. Your research topic should be in one of the following areas:

•Real-Time Communications

•Real-Time Ethernet

•Vehicular Ad Hoc Networks (VANETs)

•LTE-Advanced / 4G Networks /5G

•Network Security (any topic area under this title)

•New Network Design

•Internet of Things (IoT)

•Internet of Things Security

•Internet of Things Cyber-stalking

•Virtualisation (on any of the related areas such as standards, implementations, platforms, etc.)

•VoIP Security

•Wireless Networking (on any of the related areas such as Protocols, Standards, Technologies, etc.)

•Cloud Networking Security


1.An MS-Word research paper written using the IEEE journal paper template. The file name should be written as: StudentID.doc  .

2.The maximum number of pages should be 6 pages and a minimum of 4 pages a minimum font size of 10

3.Make sure that your document has your name and student ID clearly shown in the Author information.

4.This file should be submitted via the Assignment 1 link under the Assessment & Feedback section.

5.No hard copy is required and none will be accepted. Your first submission on BREO will be the final one and should any mistakes in submissions made, the marking will be based on the submitted work.

Quality Work

Should the staff identify any paper of publishable quality, you will be informed and at discretion of unit staff the paper may be prepared and submitted for publication.

What do I need to do to pass? (Threshold Expectations from UIF)

•Identify appropriate research in a given aspect of computer networks and security

•Present a review of the current state of the art in an area of computer networks and security

•Compare and make judgements about alternative approaches and technologies

•Reference your work according to academic standards

How do I produce high quality work that merits a good grade?

1.The title of your paper should be specific to one of the above areas with a specific theme and area of implementation behind it and not a generic one (e.g. the title must not be ‘Network Security’ or ‘VoIP’, etc. – such generic titles will result in marks deducted). Your work should concentrate on the latest developments in the selected area.

2.Avoid using quoted text unless it is essential. Too much quoted text will result in marks deducted as it does not show your own work. All your references must be within the past 5 years and only use earlier ones if you are referring to a standard, original work start of a theory, etc. All references must come from quality sources such as journals, and conferences. Some reputable websites may be used such as BBC News or other security websites, e.g. SANS, CERT, etc. Wikis, blogs, and similar websites are not accepted, and marks will be deducted for using them. Such sites do not always contain reliable content and there is no process in place to make this more likely .

3.You MUST use the IEEE template as given on BREO and any submission that does not meet the IEEE template formatting will result in marks deducted (see marking scheme).

4.For postgraduate level, it is essential that you consider the needs and requirements of your target area of implementation (for example motorway traffic, telephony, online games, etc.) as they relate to the networking aspects and then show some critical comparison, analysis and evaluation in your paper.

sales chat
sales chat