Create a program that estimates the radio signal strength

Assignment Help Computer Networking
Reference no: EM131291734

Lab- Exercises

Lab is a modified version of Lab 4. The requirements that applied to Lab 4 also apply to Lab 7. You may
reuse the Lab 4 pseudocode and Visual Logic files, rename them and modify them to produce the Lab 7 files.

Lab Implementation Requirements

• Add a module that outputs the message: For the computer located n feet from the AP, the signal strength is: range

Where:

N = the distance from the computer to the AP (in ft, integer values, e.g., 2, 5, 100, etc.).

Range = the estimated radio signal strength, expressed as a range.

An example of an actual message is: For the computer located 10 feet from the AP, the signal strength is: 100-80%

The module requires two parameters (n and range), which are used to output the message. Call the module in the appropriate places, in the pseudocode and the Visual Logic files.

Lab Expected Submittals

1. The Visual Logic program (50%).

2. Formal pseudocode (following the book syntax, proper indentation, with variable declarations, etc.). Use Notepad++ to create the pseudocode (*.txt file) (50%).

In a wireless SOHO (Small Office/Home Office) network, the strength of the radio signal is (among others) a function of the distance between the wireless Access Point (AP) (e.g., a wireless router) and the computers wirelessly connected to the network. The longer the distance between the AP and a computer, the weaker the radio signals.

Assume that the wireless SOHO network is based on the IEEE 802.11g protocol, case in which the approximate maximum range between the AP and the computers is 125 ft.

Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%). For example, for a computer situated 10 ft away from the AP, the estimated radio signal strength would be 100 - 80%.

Program Inputs:

• The distance from the computer to the AP (in ft, integer values, e.g., 2, 5, 100, etc.).

Program Outputs:

• The estimated signal strength (%) - a range.

Program requirements:

• The program must implement at a minimum three modules (or more if needed)

• During a single run, the program must be able to process multiple inputs.

• The prompt for data input is user-friendly (i.e., the user of the program does not see the program's variable names).

• Given that it is unknown how many data inputs the user will provide to the program, upon start, display a message letting the user know how to terminate the current execution of the program.

• The program must display a title on the Visual Logic's console.

• Program outputs are displayed on the Visual Logic's console - one line after another, with user-friendly labels.

Expected Submittals

3. The Visual Logic program (50%).

4. Formal pseudocode (following the book syntax, proper indentation, with variable declarations, etc.). Use Notepad++ to create the pseudocode (*.txt file) (50%).

IMPORTANT NOTE 1: If your Visual Logic code uses compound Boolean operators, make sure you read the TIP on page 26, in the Visual Logic book.

IMPORTANT NOTE 2: Test your program with multiple distance values, to insure that the outputs (the corresponding signal strength ranges) are correct. In your design you must consider which signal strength value the program will display, when the distance between a computer and the AP is longer than 125 feet.

Reference no: EM131291734

Questions Cloud

How much money to pursue the project : We are looking for financial justification as to why Winn-Dixe should adopt/expand an/their organic food line and a 5 year financial analysis of it.
Design and implement class called date that has data members : Design and Implement a class called Date that has data members to store month (as a number), day, year, and name of the month. showDate1() should display the date in 1/1/2001 format.
What is the probability that the shop is empty : What is the probability that the shop is empty?- What is the average number of customers in the barbershop?- What is the average time spent in the shop?
Common security weaknesses inherent : What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?
Create a program that estimates the radio signal strength : Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%).
Identify the critical components of operations management : Identify the critical components of operations management function in differing organisations and clearly demonstrate their relationship to decision making and value chain.
Calculating the price of pizzas : This assignment will involve modifying that application to include calculating the price of pizzas. Assumethat the price of a small pizza is $10.95, the price of a medium pizza is $13.95, and the price of a largepizza is $16.95.
Explain the causes of variations in growth : Briefly explain in one paragraph (10 sentences) the causes of variations in growth during the preschool years.
Request without sending to the authoritative server : When does a domain name server answer a request without sending to the authoritative server?

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd