|COMP1797 (2021/22)||Wireless and Mobile Technologies||Contribution: 50% of the course|
|Course Leader: Jason Parke||Coursework 2||Deadline Date: Friday 08/04/2022|
Coursework Submission Requirements
- An electronic copy of your work for this coursework must be fully uploaded on the Deadline Date of Friday 08/04/2022 using the link on the coursework Moodle page for COMP1797.
- For this coursework you must submit a single PDF document. In general, any text in the document must not be an image (i.e. must not be scanned) and would normally be generated from other documents (e.g. MS Office using “Save As .. PDF”). An exception to this is hand written mathematical notation, but when scanning do ensure the file size is not excessive.
- There are limits on the file size (see the relevant course Moodle page).
- Make sure that any files you upload are virus-free and not protected by a password or corrupted otherwise they will be treated as null submissions.
- Your work will not be printed in colour. Please ensure that any pages with colour are acceptable when printed in Black and White.
- You must NOT submit a paper copy of this coursework.
- All courseworks must be submitted as above. Under no circumstances can they be accepted by academic staff.
The University website has details of the current Coursework Regulations, including details of penalties for late submission, procedures for Extenuating Circumstances, and penalties for Assessment Offences.
DETAILED COURSEWORK SPECIFICATION: This is individual coursework.
Mini-project: “Choosing the best LPWAN technology.”
Scenario: You are employed as a Solution Architect for Emerging Technologies in a leading IoT networking company. One of your main responsibilities is to architect and design solutions to meet functional and non-functional customer requirements. Your latest project is about IoT-based smart agriculture applications. You have been asked to architect and design a cattle health monitoring solution leveraging Low Power Wide Area Network (LPWAN) devices and protocols. The devices (equipped with sensors) are deployed through a collar that is attached to each cow and report data on the cow’s health (e.g. body temperature to predict the onset of disease). You have been provided with the following customer requirements:
- Ease of deployment – A quick deployment with minimal additional infrastructure. The data is transmitted consistently for years without needing costly, frequent maintenance.
- Extensive coverage – A consistent connectivity for the wide-area ranches. The real-time data on cow wellbeing and location is received at a gateway/gateways to monitor cattle.
- Cost-efficiency – Following the deployment, a return on investment (ROI) is received in less than a year through an increase in ranch productivity and efficiency.
Task 1: Propose two potential LPWAN solutions that can be used in the above scenario. Critically discuss why the two solutions were selected. Note: Your company is able to support Sigfox, LoRaWAN, NB-IoT and LTE-M.
Task 2: For each of the three customer requirements (ease of deployment, extensive coverage, and cost-efficiency), critically discuss if and how each of the two proposed solutions satisfies the requirement. Your answer should include an explanation of which solution would be more beneficial for each of the three requirements.
Task 3: Give a brief overview of two additional benefits that the customer would have if your proposed solutions were chosen.
The final output is a report maximum 2000 words long (excluding references). The discussion needs to be supported by appropriate references presented in the Harvard referencing style. There is a 20% penalty if the report does not abide by the rule of a length of strictly no more than 2000 words (excluding references).
The precise marking scheme is included within the template of the paper and is repeated here for clarity:
Task 1: 20 marks = each solution x 10 marks Task 2: 60 marks = each requirement x 20 marks Task 3: 20 marks = each benefit x 10 marks
Each task needs to be supported by appropriate references presented in the Harvard referencing style.
|Criteria for Assessment||90-100 Exceptional||80-89 Excellent||70-79 Very Good||60-69 Good||50-59 Satisfactory||30-49 Fail||0-29 Fail|
|Assessment domain 1 Demonstrate a critical understanding of the technical challenges posed by current mobile systems and wireless communications.||Demonstrates an exceptional systematic understanding of Mobile and Wireless Network Technologies and their technical challenges. The motivation and rationale of a chosen area is underpinned by an exceptional understanding of relevant theory and best practices and engagement with the literature.||Demonstrates an excellent systematic understanding of Mobile and Wireless Network Technologies and their technical challenges. The motivation and rationale of a chosen area are underpinned by an excellent understanding of relevant theory and best practices and engagement with the literature.||Demonstrates a very good understanding of Mobile and Wireless Network Technologies and their technical challenges. There is evidence that relevant theory and best practices have been applied effectively in the choice of area, and there is the engagement with the literature.||Demonstrates overall a good understanding of Mobile and Wireless Network Technologies and their technical challenges. There is some evidence that relevant theory and best practices have been applied effectively in the choice of area, and there is some engagement with the literature.||There is satisfactory evidence that at least some Mobile and Wireless Network Technologies and practices have been applied and supported by the literature.||There is a lack of understanding of Mobile and Wireless Network Technologies and their technical challenges. The choice of the research problem lacks justifications and is not supported by the literature.||There is hardly any engagement with relevant technologies, technical challenges and best practices. The choice of the research problem is not based on engagement with the literature.|
|Assessment domain 2 Understand and evaluate the performance, costs, overheads and trade-offs of different wireless and mobile communication technologies.||The assignment provides exceptionally strong and consistent evidence of critical evaluation when considering the adequately chosen performance metrics, cost, overhead and trade-offs of the used technologies. The results of the analysis have been clearly presented||The assignment provides excellent evidence of critical evaluation when considering the adequately chosen performance metrics, cost, overhead and trade-offs of the used technologies. The results of the analysis have been clearly presented in accordance with the provided guideline.||The assignment provides very good evidence of critical evaluation when considering the chosen performance metrics, cost, overhead and trade-offs of the used technologies. The results of the analysis have been presented in accordance with the provided guideline.||The assignment provides some good evidence of critical evaluation when considering the chosen performance metrics, cost, overhead and trade-offs of the used technologies. The results of the analysis have been presented mostly in accordance with||There is some evidence of evaluation with respect to performance metrics, cost, overhead and trade-offs of the used technologies. The analysis is not very conclusive. Satisfactory presentation of||The assignment provides little evidence of evaluation with respect to performance metrics, cost, overhead and trade-offs of the used technologies. Not satisfactory presentation of the results.||The assignment lacks evidence of evaluation with respect to performance metrics, cost, overhead and trade-offs of the used technologies. No results have been provided.|
|in accordance with the provided guideline.||the provided guideline.||the results.|
|Assessment||Demonstrates an||Demonstrates an||Demonstrates a||Demonstrates||There is||There is a lack||There is|
|domain 3||exceptional||excellent||very good||overall a good||satisfactory||of||hardly any|
|Be able to||systematic||systematic||understanding of||understanding of||evidence that||understanding||engagement|
|evaluate||understanding of||understanding of||mobile and||mobile and||at least some||of mobile and||with an|
|available||mobile and||mobile and wireless||wireless network||wireless network||user||wireless||understanding|
|technologies for||wireless network||network design||design processes||design processes||requirements||network design||of mobile and|
|the design and||design processes||processes based||based on user||based on the user||have been||processes||wireless|
|implementation of||based on user||on user||requirements. The||requirements. The||considered in||based on user||network|
|mobile and||requirements. The||requirements. The||understanding is||understanding is||mobile and||requirements.||design|
|wireless networks||understanding is||understanding is||supported by the||supported by||wireless||No evidence of||processes|
|according to user||supported by||supported by||appropriate||some literature.||network||supporting||based on user|
|and is||of supporting|
|Assessment||The assignment||The assignment||The assignment||The assignment||There is some||There is a lack||There is|
|domain 4||provides||provides excellent||provides very||provides some||evidence that||of||hardly any|
|Be able to||exceptionally strong||evidence of||good evidence of||good evidence of||at least some||understanding||engagement|
|understand and||and consistent||critical evaluation||critical evaluation||critical evaluation||of the security||of the security||with|
|evaluate the key||evidence of critical||when considering||when considering||when considering||aspects of the||aspects of the||understanding|
|security threats||evaluation when||the security||the security||the security||chosen||chosen||the security|
|that relate to||considering the||vulnerability or||vulnerability or||vulnerability or||configuration||configuration.||aspects of the|
|different mobile||security vulnerability||vulnerabilities of||vulnerabilities of||vulnerabilities of||have been||No evidence of||chosen|
|and network||or vulnerabilities of||the chosen||the chosen||the chosen||considered.||supporting||configuration.|
|technologies, as||the chosen||configuration and||configuration and||configuration and||The||literature.||No evidence|
|well as||configuration and the||the appropriate||the appropriate||the appropriate||understanding||of supporting|
|countermeasures.||countermeasures.||The||The understanding||The||by some|
|The understanding is||understanding is||is supported by||understanding is||literature.|
|supported by||supported by||the appropriate||supported by|
|extensive literature.||extensive||literature.||some literature.|
Get expert help for Wireless and Mobile Technologies and many more. 24X7 help, plag free solution. Order online now!