Goals of the selected wireless network design

Assignment Help Computer Networking
Reference no: EM132130890

Wireless Sensor Networks (WSN) let users to access servers, printers, and other network resources regardless of their location, within the wireless reach. This flexibility means that, for example, a user's laptop stays connected working from a colleague's cubicle, from a small meeting room, or from the cafeteria. These wireless sensor networks are deployed in different domains as follows.

- Mission critical applications (military applications)
- Emergency response systems (Fire response systems)
- Forests
- Agricultural fields
- Water quality monitoring
- Health applications
- Natural Disaster Pretension
- Smart Home

TASK

Select one of the domains from the above list. Create a design report discussing the design of a WSN for that domain.

Design choices are dependent on: your goals, budget, deployment environment (indoor or in a remote location) and technology choices.

In your design document you should answer the following questions.

1. Discuss the goals of the selected wireless network design.

2. Explain how the selected WSN design will improve the quality of service.

3. Which wireless system (fixed/random/ad hoc) is best suited for the application? Justify your choice of the system.

4. Explain what topology, routing protocols are most suitable for your WSN. Discuss advantages and disadvantages of deployed topology.

5. Managing security is important. Analyse your WSN security concerns and provide a solution to security issues.

Reference no: EM132130890

Questions Cloud

Create a gantt chart for a hypothetical project : Using Microsoft Project or other similar software create a GANTT chart for a hypothetical project that involves at least 7 tasks, and two milestones.
How it professionals can attempt to estimate time : IT projects are particularly challenging as we are frequently asked for cost and time estimates before we do the Requirements Phase.
Discuss about the three dimensions of security : Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict.
Would you pay if it were your own personal data : Would you pay if it were your own personal data? How can you protect yourself? When it comes to corporate data, should corporations pay?
Goals of the selected wireless network design : NIT6140 - Sensor Networks - Victoria University - Create a design report discussing the design of a WSN for that domain - Discuss the goals of the selected
What is the probability that at least 1 of the 25 new cars : What is the probability that at least 1 of the 25 new cars sold will require a warranty repair in the first 90 days?
How would you incorporate diversity in designing a team : Discuss team identity. Why do you feel attached to certain groups and teams but not to others?
How many variables are mentioned in description : How many variables are mentioned in this description?
How many variables are mentioned in this description : Next time you see an elderly man, check out his nose and ears! While most parts of the human body stop growing as we reach adulthood, studies

Reviews

Write a Review

Computer Networking Questions & Answers

  Discuss about the client server and distributed computing

Explain why you chose the advantage and challenge that you did, and provide one (1) real-world example of each environment.

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  What is an intrusion prevention system

What techniques can be used to reduce the chance that social engineering will be successful? - What is an intrusion prevention system?

  Explain ways that automation can improve our sa productivity

Explain several ways that automation can improve our SA productivity. What two common SSA tasks might benefit most from automation and how can we apply it to them.

  What is the amount of information in bits transmitted

What is the amount of information in bits transmitted by announcing the name of a chosen card from a deck of 52 playing cards?

  Explain in detail how fdma and tdma work

Explain in detail how FDMA, TDMA, and CDMA work. Give two examples of where each is currently used in the real world.

  Mobile-network environment the need for information

In today's distributed, global, mobile-network environment the need for information risk management in organizations has never been greater.

  Question security infrastructure and protocols a pki and

question security infrastructure and protocols a. pki and pgp are two methods for generating and managing public keys

  Compare server-based and client-based architecture

Compare and contrast server-based architectures, client-based architectures and client-server- based architectures.

  Display all the last names from the customers table

Display all the Last Names from the Customers table and any associated OrdersIDs from the Orders Table. Show the Last Name even if they do not have any associated orders. Order the results by LastName in ascending order.

  Identify how ip telephones access their media controllers

Identify how IP telephones access their media controllers. IP telephones access their media controllers through a hub. IP telephones access their media controllers through a bridge.

  What major risks behind implementing cloud computing program

What are some of the major strategies and risks behind implementing cloud computing programs in today's technology filled world?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd