Get Instant Help From 5000+ Experts For

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
CIS4020-N Mobile Systems and Cybersecurity


AMY Networks is a consultancy business that designs, installs and operates different types of wireless and wired networks for businesses and research organisations.� As one of their project leaders you have been asked to respond to an ITT (Invitation to Tender) for this network design.� The network solution will include the wireless sensor network logical design along with protocols specifications.

The ITT document is included with this ICA.� The tender that you produce in response to the ITT should take the following form.

Part 1 � Design�

You need to respond to the ITT with following documents: -

Logical layout and implementation of the WSN deployment (You must show the overall connectivity between the different network elements).

Design and implement an addressing scheme for WSN(for example IPv6 equivalent). You can use Packet tracer to implement the IP scheme.

Part 2 � Design Report
  • Description for the protocols you have chosen for the wireless sensor network and how they will prolong the network life time (Restrict discussion to Routing, MAC and Physical Layer)
  • Enhanced security solution for the network including identification and mitigation of the security risks

- Realistic and insightful conclusions drawn from the research.�

- A full discussion about the nature of future developments should be included

The discussion should include a plan for integrating the different network protocols into the new network design. Your discussion must be supported by published research or simulation.�

Part 3 � Presentation

Marks will be awarded for the overall presentation of your work.� Your work should be of a professional standard.

  1. Appraise the technologies that are used to develop wireless based networks.
  2. Evaluate and compare the various mechanisms that are used to ensure effective communication between mobile devices and the real-world.
  3. Demonstrate a comprehensive and critical understanding of the security risks that are associated with a range of mobile devices and formulate suitable strategies for protection of the data held by them.
  4. Research, assess and evaluate the complex relationships which exist between these technologies in real-world mobile devices.
  5. Integrate and synthesise diverse knowledge, evidence concepts, theory and practice in wireless communications, to solve problems.
  6. Critically appraise the networking technologies that are currently used by mobile devices.
  7. Demonstrate a comprehensive knowledge of the hardware technologies that are currently used by mobile devices.

There are several key technologies used to develop wireless-based networks, each with their unique features and advantages. Some of the prominent technologies used in wireless networks include:
Wireless Local Area Network (WLAN): WLANs are based on the IEEE 802.11 standard, commonly known as Wi-Fi, and are widely used for wireless connectivity within a limited area, such as homes, offices, and public places like airports and cafes. WLANs use radio waves to transmit and receive data over the air, allowing devices like smartphones, laptops, and IoT devices to connect to the internet wirelessly.
Cellular Networks: Cellular networks are based on various cellular standards, such as 3G (Third Generation), 4G (Fourth Generation), and 5G (Fifth Generation). These networks are used for wide-area wireless connectivity and provide mobile voice, data, and internet services to mobile devices like smartphones, tablets, and other IoT devices. Cellular networks use a complex infrastructure of cell towers, base stations, and core networks to provide wireless coverage over large geographical areas.
Bluetooth: Bluetooth is a wireless technology standard used for short-range communication between devices, typically within a range of up to 10 meters. Bluetooth is commonly used for connecting peripherals like headsets, keyboards, and speakers to smartphones, tablets, and other devices. Bluetooth technology is also widely used in IoT devices for communication and data transfer between devices in close proximity.
sales chat
sales chat