KF7031 Cyber Security And Advanced Computer Science

WLAN users will notice that actual data throughput, as perceived by the clients on a WLAN only approaches half of this value and is sometimes even less. Implementing secure communications on the wireless link will reduce apparent throughput further. Users will sometimes put this lower actual bit rate down to underperforming systems, but this is usually not the case. The lower through put rate is primarily due to the MAC and physical layer overheads in the 802.11 architecture and is therefore intentional.

Security protocols place additional overhead on communications and further reduce apparent throughput rates. Communication between a wireless client and an access point is governed by a strict set of protocols that introduces fixed delays in the communication channel.  Indeed the delays do not change significantly despite faster underlying channel bit rates.

The following Learning outcomes will be addressed in this assignment:

KU1 – Be able to describe, explain critically and analyse wireless data  communication technology along with associated security issues.

KU2 – Be able to analyse and model wireless behaviour using appropriate mathematics

IP1 – Critically analyse enterprise requirements for wireless systems

IP2 – Critically analyse 802.11 protocol information

IP3 – Make critical decisions about designing secure wireless networks

This introduces your paper and work that you are presenting.  You can outline the structure of your paper here too. You do NOT need to provide a background to 802.11 here – focus on the work you have done and it’s context.

You are expected to provide theoretical underpinning of your throughput model(s), probably based on papers you have read. You should present some modelled data that can be later compared with measured data. The modelling will probably be in two parts, one exploring the impact of MAC layer overheads and the other the impact of security overheads.

You need to describe your experimental procedure in sufficient detail someone else could reproduce what you have done. Use diagrams where appropriate.

Described your results and observations from your experimental process

Discuss you’re your observations here, paying particular attention to what you expect to see from your theoretical discussions and how this compares with your observations. Try to explain any differences.  Use your observations to explain the differing contributions that each overhead has to the overall throughput rate.

You should additionally comment on the robustness of the link security mechanism and compare it with WEP or WPA (depending which you chose) and WPA Enterprise.  Please look at the learning outcomes (above) to help guide your discussion.

Does your paper content flow logically?  Is it written clearly?  Is it formatted well?  Appropriate usage of diagrams?

The post KF7031 Cyber Security And Advanced Computer Science appeared first on My Assignment Online.

WhatsApp
Hello! Need help with your assignments?

For faster services, inquiry about  new assignments submission or  follow ups on your assignments please text us/call us on +1 (251) 265-5102

🛡️ Worried About Plagiarism? Run a Free Turnitin Check Today!
Get peace of mind with a 100% AI-Free Report and expert editing assistance.

X