New

Learn smart - Learn online. Upto 88% off on courses for a limited time. View Courses

Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!
loader
Add File

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!

Stuck on Your Question?

Get 24x7 live help from our Top Tutors. All subjects covered.

loader
250 words

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Students Who Viewed This Also Studied

70 Pages
Specialist Cyber Security Skills

Module C ode: 7COM1067 Module Ti tle: Digital Forensics ID N umber: April 2021 Table of Contents Task 1 ................................ ................................ ............. ...

Course

7COM1067

Subject

Networking

University

University of Hertfordshire

Season

Autumn

0 Page
Software Development Organization

...

Course

MN621

Subject

Networking

University

Melbourne Institute of Technology

Season

spring

16 Pages
ITN 100: Introduction to Telecommunications

Task: Part ABeing able to convert decimal values to binary (and vice versa) is very important in networking because this is the basis for how subnetting is done. You may have done some of these exerc ...

Course

ITN 100

Type

Programming

Subject

Networking

University

Northern Virginia Community College

19 Pages
ICT120 Introduction to Computer Networks

Question: Case Study: Network Design for Safety Supplies Safety Supplies is a wholesaler who supplies safety supplies to companies in Australia and New Zealand. They buy goods branded with their l ...

Course

ICT120

Type

Assignment

Subject

Networking

University

University of the Sunshine Coast

KF7031 Wireless Networks and Security

Question

Answered

Question:

An answer for an exam that is submitted after the published submission deadline as set out above, without approval, will be regarded as not having been completed. A mark of zero will be awarded for the assessment.

The usual rule that applies to coursework and gives students a 10% penalty where work is submitted up to 24 hours after the published hand-in deadline does NOT apply here.

Any exam answer submitted after the deadline is an automatic fail.

If you have technical problems and are unable to submit your exam answer on Turnitin, you should contact [email protected] and your module tutor, and provide details of the issue, as well as your completed answers, if your email is outside normal working hours.

Word limits and Penalties

The maximum limit for this assessment is 3900 words.

Where a student exceeds this limit, the marker will stop reading when they judge that the work exceeds the limit and will indicate on the text where they stop reading. A mark will only be awarded for content up to this point.

Please note this is a maximum word limit, you do not have to use all the permitted words in your answers.

a)A wireless transmission system needs to overcome several key issues (challenges) related to the behaviour of radio frequency (RF) propagation in wireless channels. One such challenge is multipath propagation.  Explain the effects of multipath on signals at a wireless receiver. 

b)In wireless communications, how does the power of a signal change with respect to distance? Critically analyse the relationship between power seen at the receiver and the distance ‘r’ between transmitter and receiver.  If the distance ‘r’ is increased by 4 times, how would it affect the signal power seen at the receiver? Show your workings.

c)Assume that an isotropic radiator transmitting at 100 mW is placed at a distance of 100 m from the receiver. If the receiver is using a parabolic dish of 0.25 m radius with an efficiency of 55%, what will be the power in watts seen by the receiver?  

d)Assume the following scenario: an Engineer John Doe from Newcastle City Council installed a new wireless LAN in the Eldon Square shopping Mall after performing a wireless site survey. After installation he measured RF signal strength and coverage and found it adequate. During the first two weeks of December 2019 (busy Christmas shopping season), bad weather forced many shoppers from the street into the mall such that it was crammed with people. Many complained about the poor quality of wireless network. During this time, the signal strength and quality of WLAN was less than desirable in many areas. What do you think is the reason(s) for poor wireless signals? Which RF signal property might have contributed to the poor signal reception?

Question 2

Note: Word limit for each question part is 200 words excluding references, equations and diagrams.

a)Suppose that a signal travels through a wireless transmission medium and its power is reduced to fourth (1/4). How much of the signal power is lost in dB? Show your workings in the answer.

b)IEEE 802.11n introduced few significant enhancements to the previous version (802.11g). Critically explain how these enhancements resulted in producing a wireless standard that was capable of achieving much higher data rates?

c)Analyse how VSWR could potentially damage the system.

d)A WLAN Access Point configured at 2.4 GHz has two antennas that are separated by 4 inches. How many wavelengths separate the antennas? How this separation between the antennas would affect the reliability of transmission?

Question 3

Note: Word limit for each question part is 250 words excluding references, equations and diagrams.

a)Assume you are working as a Network Engineer for a Telecommunications service provider and your task is to estimate the feasibility of a 10 km link between two buildings with one access point and one client radio.  The access point is connected to an antenna with 10 dBi gain, with a transmitting power of 100 mW and a receive sensitivity of -84 dBm.  The client is connected to an antenna with 13 dBi gain, with a transmitting power of 16 dBm and a receive sensitivity of -82 dBm. The cables in both systems are short, with a loss of 2dB at each side at the 2.4 GHz frequency of operation. What is the link margin? By examining the link margin, comment on the reliability of the link.

b)What recommendation you would make to improve the link margin for the system deployed in part a above?

Question 4

Note: Word limit for each question part is 200 words excluding references, equations and diagrams.

a)Consider an IEEE802.11b based ad hoc wireless network that uses distributed coordinated function (DCF) as its MAC protocol. The network parameters are configured as follows: Raw data rate = 11 Mbps, Slot time = 20 us, SIFS = 10 us, DIFS = 50 us, CW_min (Slot time) = 31, CW_max (Slot time) = 1023. Assume that there are three wireless stations A, B and C are active on the network. Assume all stations are within each other's coverage range. If A and B both receive 1500 Byte data (payload) to transmit to C at the same time, A wins the contention and begins transmission. Using the virtual carrier sense performed by station B, how long it should remain quiet (inactive) before trying for transmission.

b)In a WLAN environment, will multiple SSIDs and BSSIDs affect the performance of the network? Justify your answer.

c)Briefly explain which factors are important for planning a Wireless LAN design for a campus network.

Question 5

Note: Word limit for part (a) is 500 words excluding references, equations and diagrams. Word limit for part(b) is 200 words excluding references, equations and diagrams.

a)Assume that Alice and Bob wish to exchange a secret message using the RC4 cipher. The secret message contains the time of meeting at a nearby cafe. Alice encodes the meeting time of 12:15 hrs using a secret key [4321]. Using a state vector of 8x3, find the value of the cipher text. Show your working of the iterations of RC4 algorithm.

Hint: You may ignore the in the meeting time and consider it a string [1215]. The state vector consists of 8 elements and each element is represented by 3 bits.

b)In part (a) above, Alice achieved confidentiality by encrypting the message using the RC4 cipher. If both wish to further enhance the security of this communication such that it is safe from attacks that compromise integrity, authentication, and non-repudiation. Which security mechanism they must use? You may explain the details of the technique used with the help of a figure.  

Question 6

Note: Word limit for each question part is 250 words excluding references, equations and diagrams.

a)Wireless hijacking is a serious threat for the WLAN networks. Explain how a rogue user (adversary) could hijack an active wireless session. List the number of steps, providing brief explanation of each step. (Hint: you may use a simple diagram involving wireless client, Access Point, Adversary).    

 

b)Analyse what can happen when an intruder compromises the pre-shared key (PSK) or passphrase used during WPA/WPA2-Personal authentication?

KF7031 Wireless Networks and Security

Answer in Detail

Solved by qualified expert

Get Access to This Answer

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Hac habitasse platea dictumst vestibulum rhoncus est pellentesque. Amet dictum sit amet justo donec enim diam vulputate ut. Neque convallis a cras semper auctor neque vitae. Elit at imperdiet dui accumsan. Nisl condimentum id venenatis a condimentum vitae sapien pellentesque. Imperdiet massa tincidunt nunc pulvinar sapien et ligula. Malesuada fames ac turpis egestas maecenas pharetra convallis posuere. Et ultrices neque ornare aenean euismod. Suscipit tellus mauris a diam maecenas sed enim. Potenti nullam ac tortor vitae purus faucibus ornare. Morbi tristique senectus et netus et malesuada. Morbi tristique senectus et netus et malesuada. Tellus pellentesque eu tincidunt tortor aliquam. Sit amet purus gravida quis blandit. Nec feugiat in fermentum posuere urna. Vel orci porta non pulvinar neque laoreet suspendisse interdum. Ultricies tristique nulla aliquet enim tortor at auctor urna. Orci sagittis eu volutpat odio facilisis mauris sit amet.

Tellus molestie nunc non blandit massa enim nec dui. Tellus molestie nunc non blandit massa enim nec dui. Ac tortor vitae purus faucibus ornare suspendisse sed nisi. Pharetra et ultrices neque ornare aenean euismod. Pretium viverra suspendisse potenti nullam ac tortor vitae. Morbi quis commodo odio aenean sed. At consectetur lorem donec massa sapien faucibus et. Nisi quis eleifend quam adipiscing vitae proin sagittis nisl rhoncus. Duis at tellus at urna condimentum mattis pellentesque. Vivamus at augue eget arcu dictum varius duis at. Justo donec enim diam vulputate ut. Blandit libero volutpat sed cras ornare arcu. Ac felis donec et odio pellentesque diam volutpat commodo. Convallis a cras semper auctor neque. Tempus iaculis urna id volutpat lacus. Tortor consequat id porta nibh.

171 More Pages to Come in This Document. Get access to the complete answer.

MyAssignmenthelp.com has achieved the status of the best essay writing service because of an unbreakable record of delivering high-class service. Our efficient team of essay writers are based in different countries including the USA, UK and Australia. We have build teams of native essay writers to deliver country-specific, universities' requirement based custom essay help. Other than making sure that students get customised solutions. We deliver requirement based solutions and ensure that the price remains reasonable so that students can readily access our services. Because of our flexible approach, students who search the internet with search terms like write my essay at a cheap rate, find our service most in sync with their demands.

More kf7031 KF7031 Wireless Networks and Security: Questions & Answers

Q
icon

We aren't endorsed by this University

Specialist Cyber Security Skills

Module C ode: 7COM1067 Module Ti tle: Digital Forensics ID N umber: April 2021 Table of Contents Task 1 ................................ ................................ ................................ ................................ ............. 1 1. Case Management ....... ...

View Answer
Q
icon

We aren't endorsed by this University

Software Development Organization

...

View Answer
Q
icon

We aren't endorsed by this University

ITN 100: Introduction to Telecommunications

Task: Part ABeing able to convert decimal values to binary (and vice versa) is very important in networking because this is the basis for how subnetting is done. You may have done some of these exercises in high school and probably didn’t know why it was important to be able to convert decima ...

View Answer
Q
icon

We aren't endorsed by this University

ICT120 Introduction to Computer Networks

Question: Case Study: Network Design for Safety Supplies Safety Supplies is a wholesaler who supplies safety supplies to companies in Australia and New Zealand. They buy goods branded with their logo from overseas and Australia. They have two key departments the logistics/ warehousing department ...

View Answer

Content Removal Request

If you are the original writer of this content and no longer wish to have your work published on Myassignmenthelp.com then please raise the content removal request.

Choose Our Best Expert to Help You

icon

5% Cashback

On APP - grab it while it lasts!

Download app now (or) Scan the QR code

*Offer eligible for first 3 orders ordered through app!

screener
ribbon
callback request mobile
Have any Query?