Write short notes after investigating the scenario

Assignment Help Computer Networking
Reference no: EM13500951

Write short notes after investigating the following scenarios :

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router. 
ii. Power Control -- Lowering the transmit power of the user's wireless router. 
iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadb and wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

 

 

 

Channel bandwidth

 

 

 

Radio Technology

 

 

 

Half/Full Duplex

 

 

 

Modulation technique

 

 

 

Bandwidth Efficiency

 

 

 

Access protocol

 

 

 

Feature x

 

 

 

Feature y

 

 

 

Feature z

 

 

 

5. Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

What is a survey?

The goal of a survey is to give a broad, structured overview of a specific area.

For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks.

A survey is different from a set of paper summaries. The survey should focus on presenting the "big picture" using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal.

Verified Expert

Reference no: EM13500951

Questions Cloud

Why does congress allow tax deferral on the formation of a : Discuss how a taxpayer’s tax basis in property received in a property transaction will be affected based on whether a property transaction results in gain exclusions or gain deferral.
What is the output voltage : A transformer has 400 primary turns and 1510 secondary turns. The input voltage is 120 V and the output current is 16.0 A. Assume 100 percent efficiency. What is the output voltage
Find how much kinetic energy did each piece acquire : An explosion breaks an object into two pieces, one of which has 1.5 times the mass of the other. how much kinetic energy did each piece acquire
Demonstrate knowledge analyzing organisational information : Identify and present the issues within the context of the assigned task and from this demonstrate a logical structure and layout for the paper - demonstrate knowledge of analyzing organisational information and of the literature relevant to the is..
Write short notes after investigating the scenario : Explain how does the CSMA/CA in DCF handle media contention and what would you recommend as a remedy to this drawback, if there any
What is the implied credit spread for russian government : Suppose the interest on Russian government bonds is 7.5%, and the current exchange rate is 28 rubles per dollar. If the forward exchange rate is 28.5 rubles per dollar, and the current U.S. risk-free interest rate is 4.5%, what is the implied credit ..
Determine the peak electric field strength : The magnetic field in an electromagnetic wave has a peak value given by B = 5.5 µT. For this wave, determine the peak electric field strength
Find the velocity of each block after they have moved apart : Blocks A (mass 2.00 kg) and B (mass 15.00 kg) move on a frictionless, horizontal surface. Find the velocity of each block after they have moved apart
Find the speed of the large fish : A 16.0 kg fish swimming at 1.40 m/s suddenly gobbles up a 4.50 kg fish that is initially stationary. Neglect any drag effects of the water. Find the speed of the large fish just after it eats the small one

Reviews

Write a Review

Computer Networking Questions & Answers

  Difference between symmetric and public key system

What is the most important difference between a symmetric key system and a public key system and in what way does a hash function provide a better message integrity check than a checksum

  Expected time to find passwords using dictionary attack

Determine the expected time to find all users' passwords using dictionary attack? suppose that eight more characters were added to password and that DES algorithm was changed so as to use all 16 password characters.

  How to decrypt a message using classical cryptography

Part 1a. How to encrypt a message using classical cryptography algorithms we covered in class? Are these methods secure?b. How to decrypt a message using classical cryptography

  What is the minimum size of an icmpv4 packet

What is the minimum size of an ICMPv4 packet? What is the maximum size of an ICMPv4 packet?

  Analyze the result obtained regarding http page response

Analyze the result we obtained regarding the HTTP page response time. Collect four other statistics, of your choice, and rerun the simulation of the Simple and the Busy network scenarios.

  Input is control signal to represent four-bit binary number

When k=0, m=n+1, when k=1, m=n+2. Suppose that input for which m>1111 will never happen. The input variable will available from switches.

  1 a discuss the importance of scada securityb why are scada

1. a. discuss the importance of scada security.b. why are scada systems particularly vulnerable to cyber treats? c.

  Develop a strategy to ensure this compatibility by using

imagine you have been hired as a network technology consultant for a small business. the owner of the business sally

  Message forwarding a computer in the computing department

message forwarding a computer in the computing department has just been turned on. the user starts up their web browser

  Evaluate whether you prefer a laptop or desktop elaborate

questionspersonal computers and networks please respond to the followingbullfrom the e-activity determine whether you

  Incorporate new servers into environment

Explain how you would incorporate new servers into environment and how you would address what additional changes might be needed.

  Using microsoft visio or an open source alternative such as

refer to the rmo csms domain model class diagram shown in figure 4-23 on page 111 of the textbook and the discussion of

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd