Part A: Comparative Analysis [8 marks] 1. Please elaborate your understanding ab
ID: 3747218 • Letter: P
Question
Part A: Comparative Analysis [8 marks]
1. Please elaborate your understanding about how RFID and NFC work. What are the current security considerations and challenges? [ 4 marks]
2. Set up a wireless network by using Packet Tracer simulation software. Select generic laptops and access points from the list of available devices and configure the wireless connections as shown in the figure below.
Make sure that initially there is no security on either the access points or the wireless clients. Implement in each Basic Service Set (BSS) in turn, the WPA2-PSK model of security with AES encryption, and note that as each link invokes this security feature, the connection initially is lost until both sides of the link authenticate to each other. The security model must be identical for every respective link between the client and access point in each BSS. Screenshot and report your test on the following sub-questions:
a) Does every laptop ping every other laptop through the authenticated connections? Explain the communication process in brief.
b) What happens when the channel is changed on any of the access points?
c) What happens if there is a passphrase mismatch between the clients and the access points?
[4 marks]
Part B: Innovative Project (7 marks)
For this assessment item you need to work in a team of two, find your partner and run group meetings, then report your target project scope to your lecturer for approval. Your team must submit a recorded presentation.
In the current age of the Internet of Things (IoT), massive smart devices are connected wirelessly. Examples include the smart light, smart sensors, smart city, etc. With your current knowledge and creative thinking, please develop a technical plan and design for an innovative project. The project must provide a solution to a real-world problem using the latest wireless networking technologies. Create a presentation outlining your ideas. Limit yourself to a maximum of 15 PowerPoint slides.
The presentation should be 10-15 min in length (10-15 slides) and targeted at your proposed project. The purpose of the presentation is to show the audiences that you understand the real problem and project vision, that you have identified the requirements for the project, and that you have proposed a technical solution to address the problem. Your presentation should include a general overview of your design, reasons for proposed wireless technologies, and how it meets the specified project goals and may discuss specific technical design issues or trade-offs that you have made in your design. [ 7 marks]
Rationale
back to top
This assessment task will assess the following learning outcome/s:
be able to investigate and evaluate various wireless networking protocols and standards.
be able to investigate and evaluate emerging wireless networking technologies.
be able to investigate theoretical and practical issues relating to wireless technology and communicate the results to specialist and non-specialist audiences.
be able to identify the challenges and security issues posed by wireless networks.
Explanation / Answer
RFID (Radio-Frequency Identification) AND NFC (Near Field Communication)
____________
1) High Frequency RFID technology and NFC both operate at the same frequency of 13.56 Mhz.NFC is a technology that acts on
the same lines of RFID technology (i.e ISO/IEC 14443, FeliCa, and parts of ISO/IEC 18092). NFC can be operated from 30CM to
100 metres for Active RFID tags. Where as NFC can be a reader and a tag
RFID's if powered with an own power source can even be operated at long ranges of upto 100Mts, which makes it less
secure. NFC on the other hand is only meant for communication at close range, which makes it more secure.
2) Setting up packet tracer software needs hardware and software requirements
a) If connected in the same network with same SSID, the laptops could ping each other without issues. Sometimes the
security or antivirus software could be blocking the communication between the devices to avoid threats. Make sure to check
and provide necessary exceptions in your firewall or antivirus software. Ping is generally operated over the ICMP (Internet
Control Message Protocol). ICMP would generally transfer over TCP/IP ports.
b) It is not generally suggested to change channels for a RFID, since it might cause disturbance to voice and video
applications. But, when channel is changed on one access point, it would lead to packet loss initially. Once this packet
loss is noted by the Access point it would automatically start changing the channel until it identifies the Packet loss
threshold
c) In the event of Passphrase mismatch, it leads to communication failure. The Passphrase should always be changed at the
lowest traffic hours, since the process of changing the passkey should start from the gateway and move towards Access
points
Project using wireless Network
Office Network setup using IoTs and Server setup:
_________________________________________________
In a real time world, we spend huge amounts for creating office architecture. Like a PC and server setup.
In this project, we could setup a server installed with VM's which would be connected from the IOT client machines.
The client machines would only have IOT board, Input devices and a monitor. Once connected a network, the client machine would Remote connect in to the Virtual machine and operate it. This way, the data stored on the client machine would always be stored on the Server connected storage and not locally, making it more secure.
Please make the project with the information provided above.....