Define throughput in regards to wireless network

Assignment Help Computer Networking
Reference no: EM13318167

1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to workplace situations. Write short notes after investigating the following scenarios:

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router. 
ii. Power Control -- Lowering the transmit power of the user's wireless router. 
iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadband wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

 

 

 

Channel bandwidth

 

 

 

Radio Technology

 

 

 

Half/Full Duplex

 

 

 

Modulation technique

 

 

 

Bandwidth Efficiency

 

 

 

Access protocol

 

 

 

Feature x

 

 

 

Feature y

 

 

 

Feature z

 

 

 

5. Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

Reference no: EM13318167

Questions Cloud

What is the voltage across the resistor : A 700 omega and a 2300 omega resistor ar econnected in a series with a 12-V battery. What is the voltage across the 2300 omega resistor
Compute the acceleration at the moment the train speed : A train slows down as it rounds a sharp horizontal turn, going from 80.0 km/h to 58.0 km/h in the 13.0 s that it takes to round the bend. Compute the acceleration at the moment the train speed reaches 58.0 km/h
Explain what is the pressure of the mixture : 1.2 mol of helium is mixed with 2.3 mol of argon in a volume of 1.0L and a temperature of 25.0C. Assuming that helium and argon are perfect gases, what is the pressure of the mixture
How far would the launching machine slide on the moon : The question below was asked before, but this seems to ignore that the launching machine should have static friction as well, How far would the launching machine slide on the Moon
Define throughput in regards to wireless network : Define throughput in regards to wireless network and use a practical method to measure throughput of a wireless network? You should provide any appropriate screenshots.
Compute the volume in ml of 1.2 mol of a perfect gas : Calculate the volume (in mL) of 1.2 mol of a perfect gas at 25.0C and a pressure of 1.02 atm.
Determine speed of block after it has compressed the spring : a 20 kg block slides along the rough surface for which the coefficient of kinetic friction is 0.2. The block strikes a nonlinear spring with a speed of v=4.5 m/s. The spring is termed "nonlinear" because it has resistance of Fs=ks^2
Determine at what rate is the energy being dissipated : A coil has an inductance of 0.45 H and a resistance of 42 ohms. The coil is connected to a 5.6 V ideal battery. At what rate is the energy being dissipated
Compute the transverse speed and acceleration : A transverse wave on a string is described by the wave functionA transverse wave on a string is described by the wave function y=(0.120m)sin((pi*x)/8 +4*pi*t). Determine the transverse speed and acceleration

Reviews

Write a Review

Computer Networking Questions & Answers

  Since mac address is unique for each device

Since MAC address is unique for each device, why Internet does not use MAC address for routing and communications, instead, they assign an IP address to each machine? Here we do not count that MAC address is longer than IPv4 address (since IPv6 ha..

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

  How to interconnect two areas using twisted-pair ethernet

Provided that both engineering and front office areas use 10BaseT (twisted-pair Ethernet), how might you interconnect two areas?

  Arrangement of subnet masks to form subnets for departments

The organization has class C network 200.1.1 and wishes to form subnets for four departments. Write down possible arrangement of subnet masks to make this possible.

  How to use the encrypting file system

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents

  Role of project managers and telecommunications managers

Describe in scholarly detail "technical jargon" and describe the role of project managers and telecommunications managers.

  Possible ieee amendments could be used for new system

What possible IEEE 802.11 amendments could be used for the new system? What are the pros and cons of each amendment? Choose an amendment to implement and explain your choice.

  Reasons to prevent outsider obtaining free network acces

List three reasons you might still want to prevent an outsider obtaining free network access by intruding into your wireless network.

  Explain differences in wireless dsl services

Wireless DSL is available in her apartment building for $45 per month for 1.5 Mbps down and 256 Kbps up. Explain the differences in these services and make a recommendation.

  Write rule sets for two firewalls to permit traffic to flow

Computers on three internal subnets use dynamic NAT pools as follows when making connections to internet. Write down two rule sets for two firewalls which will permit only traffic described to flow.

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

  Create ip addressing scheme for five departments

You are hired to create the IP addressing scheme for five departments which will give security and access to Internet. Each department needs between 1,500 - 2,000 IP addresses.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd