Compare and contrast the inner workings of physical layers

Assignment Help Computer Networking
Reference no: EM131666468

Task
Answer the following questions:

Question 1
Compare and contrast the inner workings of physical layers for 802.11b and 802.11a standards.

Question 2
a. Explain how 802.11i allows for a client device to be authenticated against an authentication server.
b. Discuss the usage of a virtual private network in establishing an encrypted secure communications channel between two points on a public network.

Question 3
Suppose your company needs your help with WMAN project. ZeeTech is a multinational import-export company. Because ZeeTech has grown in popularity, it now has five offices in Melbourne. ZeeTech is considering implementing a WMAN technology that will link all its offices as well as provide mobile wireless access to the field workers that need to travel between different sites in a city. ZeeTech would install a WMAN in each office and provide its office employees and field workers the tablet computers and mobile phones for better customer service and marketing. For this reason you are asked to perform a comparative study on different WMAN technologies. Your report should briefly describe your chosen technology as well as justify why your chosen technology is most suitable in terms of cost of service, data capacity, service area, speed of installation, and security. Please note, this is a fictional case study and you should assume that all five offices are medium size with 40 employees in each office and around 400 daily customers/clients on average.

Question 4
Discuss the three different multiple access technologies used with 2G: time division multiple access (TDMA), code division multiple access (CDMA), and global system for mobile communications (GSM).

Rationale
This assessment task covers topics 6 to 9 and has been designed to ensure that you are engaging with the subject content on a regular basis. More specifically it seeks to assess your ability to:
- describe wireless networking concepts and their application to real life situations;
- illustrate wireless signalling techniques and describe radio frequency communications;
- investigate and evaluate various wireless networking techniques, protocols and standards;
- compare and contrast different wireless networks in terms of size, speed, limitations and applications;
- investigate and evaluate emerging wireless networking technologies;
- investigate theoretical and practical issues relating to wireless technology and communicate the results to specialist and non-specialist audiences;
- explain the challenges and security issues posed by wireless networks.

Verified Expert

The four questions has been answered as per the requirement. The first question is about the inner working of physical layer for 802.11b &b 802.11a. In the 2nd question there are two parts. PArt discusses about 802.11i allows for a client device to be authenticated against an authentication server. Part b discuss the usage of a virtual private network in establishing an encrypted secure communications channel between two points on a public network. In Question 3, a small report is prepared for ZeeTech for WMAN. In question 4 TDMA, CDMA and GSm are detailed. The papaer is prepared for approximately 1650 words. Bibliography: APA format Font: Times New Roman Font Size: 12, 1.5 spacing

Reference no: EM131666468

Questions Cloud

Review case study about two types of valves : Two types of valves are being tested to determine if there is a difference in pressure tolerances. Fifteen out of a random sample of 100 of Valve A cracked.
Determine the temperature at the pass : Before going over the pass, you stop in Map for fuel and the temperature there is 12°F. The elevation of Map is 3610 feet. Determine the temperature at the pass
Discuss screw drivers to pry open zacks window : Arthur decides to steal a very valuable statute from Zack's house. Arthur goes to Bob and borrows a set of screw drivers to pry open Zack's window
Identify whether or not the accreditation is mandatory : Identify whether or not the accreditation is mandatory. Explain the purpose for the accreditation and how it supports the organization.
Compare and contrast the inner workings of physical layers : Compare and contrast the inner workings of physical layers for 802.11b and 802.11a standards - Discuss the usage of a virtual private network in establishing
Is the student academic group claim correct : The student academic group on a college campus claims that freshman students study at least 2.5 hours per day, on average.
Define the deontological or teleological model of ethics : the majority of their decisions on the deontological or teleological model of ethics, specifically, the categorical imperative versus
Capture some of your brainstorming about that opportunity : Select and frame a problem or opportunity and to capture some of your brainstorming about that opportunity .
Complex and dynamic concept : Cultural and social identity is a complex and dynamic concept. Do you think cultural and social identities are constructed intentionally

Reviews

inf1666468

1/3/2018 5:26:32 AM

Stunning!I got every one of my questions addressed and everything! I adated more than I expected to that was over the top! I`m not that stressed over my Computer Networking assignments extend any longer! I`m more sure at this point! Much appreciated ALOT!!!

len1666468

10/2/2017 8:22:12 AM

Q1, Q2, Q3, and Q4-Referencing and Citation. 3. Referencing is consistently accurate and according to the APA* standard. All references are cited in the text (Value: 10%) 3. Referencing is mainly accurate and according to the APA standard. Most of the references are cited in the text (Value: 10%) 3. Some attempt at referencing and according to the APA standard. Few references are cited in the text (Value: 10%) 3. Attempt at referencing but not exactly according to APA standard and only few references are cited in the text (Value: 10%) 3. Referencing is absent/unsystematic (Value: 10%)

len1666468

10/2/2017 8:22:05 AM

Q1, Q2, Q3, and Q4-Clarity of expression & presentation of response. 2. Highly developed skills in expression and presentation of response. Fluent writing style appropriate to assessment task/document type. Grammar and spelling accurate. (Value: 20%) 2. Well-developed skills in expression and presentation of response. Fluent writing style appropriate to assessment task/document type. Grammar and spelling accurate. (Value: 20%) 2. Good skills in expression and clear presentation of response. Mostly fluent writing style appropriate to assessment task/document type. Grammar and spelling accurate. (Value: 20%) 2. Some skills in expression and presentation of response. Meaning apparent but writing style not always fluent or well organised. Grammar and spelling contain errors. (Value: 20%) 2. Rudimentary skills in expression and presentation of response. Not all material is relevant and/or is presented in a disorganised manner. Meaning apparent but writing style not fluent or well-organised, Grammar and spelling contain errors. (Value: 20%)

len1666468

10/2/2017 8:21:56 AM

Question 4 1. Well-structured in-depth, explanation of three different multiple access technologies used with 2G. Well addressed strengths and weaknesses of each technology. (Value: 70%) 1. Well-structured explanation of three different multiple access technologies used with 2G. Mostly well addressed strengths and weaknesses of each technology (Value: 70%) 1. Well-structured explanation but minor omissions of three different multiple access technologies used with 2G. Mostly well addressed strengths and weaknesses of each technology. (Value: 70%) 1. Some errors or omission in explanation about three different multiple access technologies used with 2G. Reason explanation about strengths and weaknesses. (Value: 70%) 1. Major omissions in the explanation. (Value: 70%)

len1666468

10/2/2017 8:21:49 AM

Question 3 1. The project report is well-organized with clear comparison of different WMAN technologies. Well-defined justification of the chosen WMAN technology in terms of cost of service, data capacity, service area, speed of installation, security, etc.; all assumptions are clearly justified with proper reasons. (Value: 70%) 1. The project report is mostly organized with some comparison of different WMAN technologies. Some justification of the chosen WMAN technology in terms of cost of service, data capacity, service area, speed of installation, security, etc.; most of the assumptions are justified with proper reasons.(Value: 70%) 1. The project report is not organized but there are some comparisons of different WMAN technologies. Some justification of the chosen WMAN technology using only some parameters; most of assumptions are justified with proper reasons. Some omissions. (Value: 70%) 1. The project report is not organized with little comparison of different WMAN technologies. Little justification of the chosen WMAN technology; reasonable assumptions are justified with some reasons. (Value: 70%)

len1666468

10/2/2017 8:21:41 AM

Question 2 1. Comprehensive explanation about how 802.11i allows for a client device to be authenticated against an authentication server; exceptional response to discuss the usage of a virtual private network in establishing an encrypted secure communications channel between two points on a public network. (Value: 70%) 1. Mostly comprehensive explanation about how 802.11i allows for a client device to be authenticated against an authentication server; excellent response to discuss the usage of a virtual private network in establishing an encrypted secure communications channel between two points on a public network. (Value: 70%) 1. Mostly comprehensive explanation about how 802.11i allows for a client device to be authenticated against an authentication server, good response to discuss the usage of a virtual private network in establishing an encrypted secure communications channel between two points on a public network. Minor omissions.

len1666468

10/2/2017 8:21:20 AM

Marking criteria Task Name: Short Answer Value: 15% CRITERIA STANDARDS High Distinction (85%-100%) Distinction (75%-84%) Credit (65%-74%) Pass (50%-64%) Fail (0-49%) Question 1 1. The response compares and contrast inner working of physical layers of 802.11b and 802.11a standards clearly. The response includes all possible information relevant to the comparison. (Value: 70%) 1. The response compares and contrast inner working of physical layers of 802.11b and 802.11a standards clearly, but the supporting information is general. The response includes some information relevant to the comparison. (Value: 70%) 1. The response compares and contrast inner working of physical layers of 802.11b and 802.11a standards clearly, but the supporting information is incomplete. The response may include information that is not relevant to the comparison. Minor omissions. (Value: 70%) 1. The response compares or contrast inner working of physical layers of 802.11b and 802.11a standards, but does not include both. There is no supporting information. The response does not include information relevant to the comparison. (Value: 70%) 1. Major omissions in the explanation. (Value: 70%)

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd