What is the purpose of our dropping the transmit power

Assignment Help Computer Networking
Reference no: EM13811175

Mixed 11b/11g WLAN Performance

1. In your opinion, what is the purpose of our dropping the transmit power to such a low level?

2. What do access point connectivity statistics collected for the roaming station show?

3. What do you think the Wireless LAN control traffic received by the roaming 11b node when it is in the engineering building is composed of?

4. How much did our roaming node reduce the total throughput in our heavily loaded WLAN?

5. What caused this reduction in "goodput" on the 11g WLAN?

6. Supposedly, 802.11b is "backwards compatible" with 802.11g, yet this lab demonstrates there are significant problems with allowing the two to coexist. What is the primary "incompatibility" between b and g?

7. There is another mechanism besides RTS/CTS that helps the incompatibility. Explain briefly the difference between RTS/CTS and CTS-to-self and when each is used.

8. What is the "protection" scheme talked about in the standard? In short, how do 11g nodes know that an 11b node is associating and how is CCK involved?

9. In addition to the added overhead of the RTS/CTS scheme, what else causes the drop in throughput you see? Are there other factors that can affect the throughput?

10. In situations where 802.11g and 802.11b are coexisting, what steps might you take to minimize the impact of the presence of the legacy nodes?

Attachment:- WLAN Performance.docx

Reference no: EM13811175

Questions Cloud

What is the size of each payment if the second payment is to : To pay off the loan of $50 000 p.a. compounding monthly, Ms. Yee agrees to make three payments in 2, 5 and 10 months respectively. The second payment is to be double the first, and the third payment is to be triple the first. What is the size of each..
Research three publicly held companies on the internet to de : e-education Research three publicly held companies on the Internet to determine their dividend policy. Choose companies from different markets (e.g., manufacturing, information technology, and the service sector). Compare and contrast their policies ..
Explain how changes in debt equity ratio impact the beta of : e-education How does the Law of Conservation of Value (presented in the text) contrast with the first and second Propositions by Modigliani and Miller? Explain how changes in debt-equity ratio impact the beta of the firm's equity. Provide a mathemati..
Will the antenna emit electromagnetic radiation : Will the antenna emit electromagnetic radiation and how long does it take a laser beam to travel to the Moon and back
What is the purpose of our dropping the transmit power : In your opinion, what is the purpose of our dropping the transmit power to such a low level? What do access point connectivity statistics collected for the roaming station show
How much vince required to pay when he paid his balance in f : If Vince charged $200 on his credit card with 18% APR and he paid his balance in full within the grace period, how much was he required to pay?
What is the magnitude of the force on the wire : A horizontal magnetic field of 1.0 x 10-4 T is at an angle of 30o to the direction of the current in a straight wire 75 cm long. If the wire carries a current of 15 A, what is the magnitude of the force on the wire?
Different types of teams found in the workplace : There are many different types of teams found in the workplace. However, no matter what label is assigned to the team, there are still fundamentals that make the team successful. The highest performing team is committed to a common goal and purpos..
Question regarding the agenda for team meeting : Write a memo to attach to the agenda for a team meeting. State the issues you know of.

Reviews

Write a Review

 

Computer Networking Questions & Answers

  Implement client and server programs on bank atm application

Implement client and server programs on bank ATM application. Give error checking if amount is legal and userID/password (created in the 1st time).

  What are congestion window size after a period of time

Iif both C1 and C2 at time t0 have congestion window of 10 segments what are their congestion window size after 2200 msec

  Where are wlan technologies going in the future

Where are WLAN technologies going in the future? Research what the next versions of the 802.11 standards are, and provide your educated opinion on how these technologies will be used.

  Explaining security domain boundaries for personal computer

Recognize and explain Trust/Security Domain boundaries that may be suitable to personal computer (workstation) security in a business context.

  Design a wireless network

(15%) Allen FINALLY has been able to secure broadband service to his home in a remote area of the country via newly installed telephone lines. He had a powerful desktop. But he wants to be able to sit on his deck when using his new laptop to do his o..

  Relational set operators-advanced sql and pl-sql

A relational Database Model allows database users to analyze data thoroughly. To accomplish this, advanced commands such as UNION and INTERSECT may be used. Describe a business scenario where a UNION relational set operator may be used to merge t..

  Information systems security

Suppose you are the IT professional in charge of security for a small pharmacy that has recently opened within a shopping mall.

  Segment network to reduce scope of compliance

To avoid having whole network subject to PCI specifications, how will you segment network to reduce scope of compliance?

  From the second e-activity decide which you would select to

envision that you are a systems administrator managing five different web servers for your company. each web server

  Why is it critical to label patch cables-ports and data jack

What do you consider the single most important reason to pay attention to faulty terminations and excessive horizontal wiring spans? Why is it critical to label patch cables, ports, and data jacks?

  Determine the security risks with respect to phishing

Mobile banking features have added several advantages for customers however; there are security risks that come with them. Determine the security risks with respect to phishing, smishing, vishing, cloning, and a lost or stolen smartphone that have..

  Compute actual maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, a nominal SNR of 56dB (400,000), and a distortion level of <0.2%. Determine actual maximum channel capacity?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd