What is media access control and why is it important

Assignment Help Computer Networking
Reference no: EM132651902

ITECH2300 Mobile Network and Wireless Communication - Federation University

Part -A
Q1. In relation to access to wireless network (e.g, WiFi), answer the following questions:

a. What is media access control and why is it important?
b. Give one example each of the controlled access methods and contention based media access methods?
c. When might one access method be preferred over another in a network, and why?
d. Under what conditions do contention-based media access control techniques outperform controlled-access techniques (i.e., have lower response time)? Explain.

Q2. Four users (U1, U2, U3 and U4) are using CDMA access techniques to transmit data to their respective receivers (U1->R1, U2->R2, U3->R3 and U4->R4). The followings are the spreading codes and the data that each user wants to send.

Users

Spreading code

Data to send

U1

1 1 1 1

1 0 1

U2

0 0 1 1

1 1 0

U3

1 0 0 1

0 0 0

U4

1 0 1 0

0 1 1

Using a spreadsheet similar to the one shown in Week 7 tutorial,
(a) show the composite signal that each receiver will receive;
(b) show how each receiver can retrieve its own data using the corresponding spreading code.

Q3. Use internet resources and describe the Australian Academic and Research Network's (AARNet) national and international network with diagram and information about the speed and the coverage.

Describe how AARNet is connected to the Internet in Australia and overseas.

Your description should be of minimum 500 words.

Q4. Compare and contrast the WiFi IEEE 802.11ax standard and latest Bluetooth standards. Your comparison should be based on technical specification and performance (e.g., data rate, modulation, range, no of channels and MIMO antenna, security features and other parameters; you should list as many as you can).

Do you view WiFi and Bluetooth as competing or complimentary technologies? Justify your answer.

Part B - Scanning Wireless Access Points

Q5. The software inSSIDer from metageek lets you scan surrounding WiFi networks.

a. Investigate wireless networks surrounding you home. Use the inSSIDer package installed on your laptop and walk through inside your home, and your front yard and backyard. Record the wireless networks available in at least two spots (make sure you cover different distance from your own access point). Capture the inSSIDer screen shots.

Give the list of available networks/access points including their technical characteristics like channel number, signal (SNR, signal to noise ratio in dB), security, etc. Include your screenshots from the software. Make some observations based on the data you collected, like, how do you relate SNR with the distance (from your own location to access points), overcrowded channels (i.e., multiple networks are transmitting using the same set of channels), etc.

b. Can you suggest any way to change your access point's (i.e., home router's) transmission setting to get better reception within your home?

Reference no: EM132651902

Questions Cloud

Network web services : You have developed the overall Virtual Private Cloud (VPC) design for the cloud initiative for Get-Sole Shoes.
What is antarctica facing : What and who are covered by the Philippine Clean Air Act? As managers of your company, how can you contribute to clean air act?
Which of the fostatements related to internally developed : Which of the fostatements related to internally developed assets IS correct? IFRS generally require that expenditures on research be capitalized
Government surveillance and personal privacy : Between the two seemingly opposing sides, what is your standpoint? How would you mediate the conflicting perspectives under the light of Christianity?
What is media access control and why is it important : What conditions do contention-based media access control techniques outperform controlled-access techniques - Describe how AARNet is connected to the Internet
Which combinations will result in the highest net income : Assuming a deflationary environment (prices are falling), which of the following combinations will result in the highest net income in year 1?
Considering the actual magnitudes of values : Discuss why considering only the presence of non-zero values might give a more accurate view of the objects than considering the actual magnitudes of values.
Describe the three important facets of blockchain : Describe the three important facets of Blockchain. How does Blockchain impact Audit? How does Artificial Intelligence and Machine Learning impact Accounting?
Describe most commonly used ANN activation functions : What is deep learning? What can deep learning do that traditional machine-learning methods cannot? describe the most commonly used ANN activation functions.

Reviews

Write a Review

Computer Networking Questions & Answers

  Determine maximum value in ring if there is unique initiator

Design an algorithm that, under the standard set of assumptions (bidirectional links, total reliability, connectivity), determines maximum value in the ring assuming that there is a unique initiator.

  What is a medium access control protocol

What purpose does a hub serve? What is the difference between a physical design and a logical design? What is a medium access control protocol?

  Describe fundamental aspects of cloud computing

Describe and explain the principles of communication in networks and Describe the role and functionality of hardware and software entities that contribute

  Use the internet and other sources to research

Finally, how often will this technique reject authorized users while accepting unauthorized users compared to other standard biometric techniques? Based on your research, would you recommend this technique? Why or why not?

  Define the security strategies of defense

In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disadvantages of implementing each security strategy

  Advantages of current technologies virtual private networks

Write down the advantages of some of the current technologies including VoIP, Unified Communications, Virtual Private Networks.

  Create a diagram of the lan or wide area network

Create a diagram of the LAN or Wide Area Network (WAN) that identifies the following: Hardware components, etc.

  Designing the school network network with guest network

MN503 Overview of Internetworking Assignment - Primary School Network Design with Guest Network. Melbourne Institute of Technology. Designing School Network

  How many atm cells are required to send a datagram

A typical remote login session using TCP generates datagrams of 41 octets: 20 octets of IP header, 20 octets of TCP header, and 1 octet of data.

  What you expect the subject of standard 1.2.840.113549 to be

Where in the tree would a new Microsoft file format for a new product be placed?

  Explain how advanced routing protocols

Explain how advanced routing protocols affect user network confidence. Utilize the requirements analysis process in deciding what performance requirements will be needed

  Consider a situation where two microcontroller

Consider a situation where two microcontrollers are connected with a CAN network. Computer 1 generates 8-bit data packets that must be sent to Computer 2, and Computer 2 generates 8-bit data packets that must be sent to Computer 1

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd