What is the purpose of our dropping the transmit power

Assignment Help Computer Networking
Reference no: EM13811175

Mixed 11b/11g WLAN Performance

1. In your opinion, what is the purpose of our dropping the transmit power to such a low level?

2. What do access point connectivity statistics collected for the roaming station show?

3. What do you think the Wireless LAN control traffic received by the roaming 11b node when it is in the engineering building is composed of?

4. How much did our roaming node reduce the total throughput in our heavily loaded WLAN?

5. What caused this reduction in "goodput" on the 11g WLAN?

6. Supposedly, 802.11b is "backwards compatible" with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary "incompatibility" between b and g?

7. There is another mechanism besides RTS/CTS that helps the incompatibility. Explain briefly the difference between RTS/CTS and CTS-to-self and when each is used.

8. What is the "protection" scheme talked about in the standard? In short, how do 11g nodes know that an 11b node is associating and how is CCK involved?

9. In addition to the added overhead of the RTS/CTS scheme, what else causes the drop in throughput you see? Are there other factors that can affect the throughput?

10. In situations where 802.11g and 802.11b are coexisting, what steps might you take to minimize the impact of the presence of the legacy nodes?

Attachment:- WLAN Performance.docx

Reference no: EM13811175

Questions Cloud

What is the size of each payment if the second payment is to : To pay off the loan of $50 000 p.a. compounding monthly, Ms. Yee agrees to make three payments in 2, 5 and 10 months respectively. The second payment is to be double the first, and the third payment is to be triple the first. What is the size of each..
Research three publicly held companies on the internet to de : e-education Research three publicly held companies on the Internet to determine their dividend policy. Choose companies from different markets (e.g., manufacturing, information technology, and the service sector). Compare and contrast their policies ..
Explain how changes in debt equity ratio impact the beta of : e-education How does the Law of Conservation of Value (presented in the text) contrast with the first and second Propositions by Modigliani and Miller? Explain how changes in debt-equity ratio impact the beta of the firm's equity. Provide a mathemati..
Will the antenna emit electromagnetic radiation : Will the antenna emit electromagnetic radiation and how long does it take a laser beam to travel to the Moon and back
What is the purpose of our dropping the transmit power : In your opinion, what is the purpose of our dropping the transmit power to such a low level? What do access point connectivity statistics collected for the roaming station show
How much vince required to pay when he paid his balance in f : If Vince charged $200 on his credit card with 18% APR and he paid his balance in full within the grace period, how much was he required to pay?
What is the magnitude of the force on the wire : A horizontal magnetic field of 1.0 x 10-4 T is at an angle of 30o to the direction of the current in a straight wire 75 cm long. If the wire carries a current of 15 A, what is the magnitude of the force on the wire?
Different types of teams found in the workplace : There are many different types of teams found in the workplace. However, no matter what label is assigned to the team, there are still fundamentals that make the team successful. The highest performing team is committed to a common goal and purpos..
Question regarding the agenda for team meeting : Write a memo to attach to the agenda for a team meeting. State the issues you know of.

Reviews

Write a Review

Computer Networking Questions & Answers

  What is security forensic

What is security Forensic? How can an organization ensure that personnel does not become part of the security problem.

  Describe how and where ip datagram fragments are reassembled

Describe how and where IP datagram fragments are reassembled. Make sure to explain how fragments from multiple datagram's are sorted out and how the order of fragments is resolved for each set of fragments.

  How to use the encrypting file system

You will learn how to use the Encrypting File System in this activity. You will create a folder, copy a file to the folder, and then encrypt the folder's contents

  Technical term paper -network design

The Technical Term Paper will include the detailed response to the network design request. The document will be submitted in MS Word and will be between 10-15 pages with graphics embedded within the document.

  Technology to internetwork the two buildings

Suppose you are working for a small business that has outgrown its existing building. What technology will you recommend to internetwork the two buildings?

  Suppose a client computer with ip address 1271929230 in

suppose a client computer with ip address 127.192.92.30 in building zz requests a large web page from the server in

  Examine the security characteristics of both ipv4

Examine the security characteristics of both IPv4, which is most prevalent in today's networks, and IPv6, which is up and coming. State and explain the major shortcomings of IPv4 that are now fixed or improved in IPv6

  Create diagram for proposed network topology

Use Microsoft Visio 2007 to create diagram for proposed network topology. Write down the proposal for research group explaining why that design would best meet their requirements.

  Describe advantages of having a componentized system

Describe some of the advantages of having a componentized system. For example, what happens if the microwave breaks?

  Computing smallest window size to optimize the throughput

Consider error-free 256 kbps satellite channel used to send 1024-byte data frames. What is smallest window size that is large enough to optimize the throughput?

  Your neighbor is starting a small billing business and has

your neighbor is starting a small billing business and has asked you to design the network. currently you neighbor has

  Why is it significant to secure windows and unix servers

CIO has asked you to describe why you suggest it is so significant to secure your Windows and Unix/Linux servers from known shortcomings/vulnerabilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd