Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Write short notes after investigating the following scenarios :

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router. 
ii. Power Control -- Lowering the transmit power of the user's wireless router. 
iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadb and wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

 

 

 

Channel bandwidth

 

 

 

Radio Technology

 

 

 

Half/Full Duplex

 

 

 

Modulation technique

 

 

 

Bandwidth Efficiency

 

 

 

Access protocol

 

 

 

Feature x

 

 

 

Feature y

 

 

 

Feature z

 

 

 

5. Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

What is a survey?

The goal of a survey is to give a broad, structured overview of a specific area.

For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks.

A survey is different from a set of paper summaries. The survey should focus on presenting the "big picture" using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal.

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M91038071
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Network & Security

Overview of network security assessment - security

Overview of Network Security Assessment - Security Challenges in Emerging Networks Purpose of the assessment - The purpose of this assignment is to develop skills to independently think of innovation. Students will be ab ...

The software company niksoft is selling a new defense

The software company NikSoft is selling a new defense against DDoS attacks. Their software looks at the source IP address on all incoming packets, and if it finds any IP address that accounts for more than 1% of traffic ...

A develop a caesar cipher-type encryption algorithm with a

a. Develop a Caesar cipher-type encryption algorithm with a little more complexity in it. For example, the algorithm could alternatively shift the cleartext letters positive and negative by the amount of the key value. V ...

Question snmp initially appeared in 1988 but it did not

Question : SNMP initially appeared in 1988, but it did not receive widespread adoption. What have been the issues with SNMP, and have they been addressed? How widely used is SNMP now? Find some examples of tools that use ...

Final project incident response exercise amp reportyour

Final Project: Incident Response Exercise & Report Your Task You have been assigned to work incident clean-up as part of the Sifers-Grayson Blue Team. Your task is to assist in analyzing and documenting the incident desc ...

Question calculate the total time required to transfer a

Question: Calculate the total time required to transfer a 1.5-MB file in the following cases, assuming an RTT of 80 ms, a packet size of 1 KB data, and an initial 2 × RTT of "handshaking" before data is sent: (a) The ban ...

Buffer overflowthe common vulnerabilities and exposures cve

Buffer overflow The "Common Vulnerabilities and Exposures" (CVE) is a list of cybersecurity vulnerabilities that have been discovered, and they are collected in a database for everyone to see and improve or patch their s ...

True or false1 tcp ensures error free transmission2 the

TRUE or FALSE 1. TCP ensures error free transmission. 2. The process that initiates the communication is the server. 3. A host can serve as both server and client in a P2P network. 4. Audio and video applications cannot ...

This is from a practical exercise the answers are below but

This is from a practical exercise. The answers are below BUT, I do not know how they came up with them. I'd like a step-by-step explanation of how they got the answers. Practical Exercise 1: Assume the demand for teacher ...

Nbspfor the remaining questions consider a 4-bit block

For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You c ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As