Write short notes after investigating the scenario

Assignment Help Computer Networking
Reference no: EM13500951

Write short notes after investigating the following scenarios :

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router. 
ii. Power Control -- Lowering the transmit power of the user's wireless router. 
iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadb and wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

 

 

 

Channel bandwidth

 

 

 

Radio Technology

 

 

 

Half/Full Duplex

 

 

 

Modulation technique

 

 

 

Bandwidth Efficiency

 

 

 

Access protocol

 

 

 

Feature x

 

 

 

Feature y

 

 

 

Feature z

 

 

 

5. Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

What is a survey?

The goal of a survey is to give a broad, structured overview of a specific area.

For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks.

A survey is different from a set of paper summaries. The survey should focus on presenting the "big picture" using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal.

Verified Expert

Reference no: EM13500951

Questions Cloud

Why does congress allow tax deferral on the formation of a : Discuss how a taxpayer’s tax basis in property received in a property transaction will be affected based on whether a property transaction results in gain exclusions or gain deferral.
What is the output voltage : A transformer has 400 primary turns and 1510 secondary turns. The input voltage is 120 V and the output current is 16.0 A. Assume 100 percent efficiency. What is the output voltage
Find how much kinetic energy did each piece acquire : An explosion breaks an object into two pieces, one of which has 1.5 times the mass of the other. how much kinetic energy did each piece acquire
Demonstrate knowledge analyzing organisational information : Identify and present the issues within the context of the assigned task and from this demonstrate a logical structure and layout for the paper - demonstrate knowledge of analyzing organisational information and of the literature relevant to the is..
Write short notes after investigating the scenario : Explain how does the CSMA/CA in DCF handle media contention and what would you recommend as a remedy to this drawback, if there any
What is the implied credit spread for russian government : Suppose the interest on Russian government bonds is 7.5%, and the current exchange rate is 28 rubles per dollar. If the forward exchange rate is 28.5 rubles per dollar, and the current U.S. risk-free interest rate is 4.5%, what is the implied credit ..
Determine the peak electric field strength : The magnetic field in an electromagnetic wave has a peak value given by B = 5.5 µT. For this wave, determine the peak electric field strength
Find the velocity of each block after they have moved apart : Blocks A (mass 2.00 kg) and B (mass 15.00 kg) move on a frictionless, horizontal surface. Find the velocity of each block after they have moved apart
Find the speed of the large fish : A 16.0 kg fish swimming at 1.40 m/s suddenly gobbles up a 4.50 kg fish that is initially stationary. Neglect any drag effects of the water. Find the speed of the large fish just after it eats the small one

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd