What is media access control and why is it important

Assignment Help Computer Networking
Reference no: EM132651902

ITECH2300 Mobile Network and Wireless Communication - Federation University

Part -A
Q1. In relation to access to wireless network (e.g, WiFi), answer the following questions:

a. What is media access control and why is it important?
b. Give one example each of the controlled access methods and contention based media access methods?
c. When might one access method be preferred over another in a network, and why?
d. Under what conditions do contention-based media access control techniques outperform controlled-access techniques (i.e., have lower response time)? Explain.

Q2. Four users (U1, U2, U3 and U4) are using CDMA access techniques to transmit data to their respective receivers (U1->R1, U2->R2, U3->R3 and U4->R4). The followings are the spreading codes and the data that each user wants to send.

Users

Spreading code

Data to send

U1

1 1 1 1

1 0 1

U2

0 0 1 1

1 1 0

U3

1 0 0 1

0 0 0

U4

1 0 1 0

0 1 1

Using a spreadsheet similar to the one shown in Week 7 tutorial,
(a) show the composite signal that each receiver will receive;
(b) show how each receiver can retrieve its own data using the corresponding spreading code.

Q3. Use internet resources and describe the Australian Academic and Research Network's (AARNet) national and international network with diagram and information about the speed and the coverage.

Describe how AARNet is connected to the Internet in Australia and overseas.

Your description should be of minimum 500 words.

Q4. Compare and contrast the WiFi IEEE 802.11ax standard and latest Bluetooth standards. Your comparison should be based on technical specification and performance (e.g., data rate, modulation, range, no of channels and MIMO antenna, security features and other parameters; you should list as many as you can).

Do you view WiFi and Bluetooth as competing or complimentary technologies? Justify your answer.

Part B - Scanning Wireless Access Points

Q5. The software inSSIDer from metageek lets you scan surrounding WiFi networks.

a. Investigate wireless networks surrounding you home. Use the inSSIDer package installed on your laptop and walk through inside your home, and your front yard and backyard. Record the wireless networks available in at least two spots (make sure you cover different distance from your own access point). Capture the inSSIDer screen shots.

Give the list of available networks/access points including their technical characteristics like channel number, signal (SNR, signal to noise ratio in dB), security, etc. Include your screenshots from the software. Make some observations based on the data you collected, like, how do you relate SNR with the distance (from your own location to access points), overcrowded channels (i.e., multiple networks are transmitting using the same set of channels), etc.

b. Can you suggest any way to change your access point's (i.e., home router's) transmission setting to get better reception within your home?

Reference no: EM132651902

Questions Cloud

Network web services : You have developed the overall Virtual Private Cloud (VPC) design for the cloud initiative for Get-Sole Shoes.
What is antarctica facing : What and who are covered by the Philippine Clean Air Act? As managers of your company, how can you contribute to clean air act?
Which of the fostatements related to internally developed : Which of the fostatements related to internally developed assets IS correct? IFRS generally require that expenditures on research be capitalized
Government surveillance and personal privacy : Between the two seemingly opposing sides, what is your standpoint? How would you mediate the conflicting perspectives under the light of Christianity?
What is media access control and why is it important : What conditions do contention-based media access control techniques outperform controlled-access techniques - Describe how AARNet is connected to the Internet
Which combinations will result in the highest net income : Assuming a deflationary environment (prices are falling), which of the following combinations will result in the highest net income in year 1?
Considering the actual magnitudes of values : Discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values.
Describe the three important facets of blockchain : Describe the three important facets of Blockchain. How does Blockchain impact Audit? How does Artificial Intelligence and Machine Learning impact Accounting?
Describe most commonly used ANN activation functions : What is deep learning? What can deep learning do that traditional machine-learning methods cannot? describe the most commonly used ANN activation functions.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd