Create a program that estimates the radio signal strength

Assignment Help Computer Networking
Reference no: EM131291734

Lab- Exercises

Lab is a modified version of Lab 4. The requirements that applied to Lab 4 also apply to Lab 7. You may
reuse the Lab 4 pseudocode and Visual Logic files, rename them and modify them to produce the Lab 7 files.

Lab Implementation Requirements

• Add a module that outputs the message: For the computer located n feet from the AP, the signal strength is: range

Where:

N = the distance from the computer to the AP (in ft, integer values, e.g., 2, 5, 100, etc.).

Range = the estimated radio signal strength, expressed as a range.

An example of an actual message is: For the computer located 10 feet from the AP, the signal strength is: 100-80%

The module requires two parameters (n and range), which are used to output the message. Call the module in the appropriate places, in the pseudocode and the Visual Logic files.

Lab Expected Submittals

1. The Visual Logic program (50%).

2. Formal pseudocode (following the book syntax, proper indentation, with variable declarations, etc.). Use Notepad++ to create the pseudocode (*.txt file) (50%).

In a wireless SOHO (Small Office/Home Office) network, the strength of the radio signal is (among others) a function of the distance between the wireless Access Point (AP) (e.g., a wireless router) and the computers wirelessly connected to the network. The longer the distance between the AP and a computer, the weaker the radio signals.

Assume that the wireless SOHO network is based on the IEEE 802.11g protocol, case in which the approximate maximum range between the AP and the computers is 125 ft.

Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%). For example, for a computer situated 10 ft away from the AP, the estimated radio signal strength would be 100 - 80%.

Program Inputs:

• The distance from the computer to the AP (in ft, integer values, e.g., 2, 5, 100, etc.).

Program Outputs:

• The estimated signal strength (%) - a range.

Program requirements:

• The program must implement at a minimum three modules (or more if needed)

• During a single run, the program must be able to process multiple inputs.

• The prompt for data input is user-friendly (i.e., the user of the program does not see the program's variable names).

• Given that it is unknown how many data inputs the user will provide to the program, upon start, display a message letting the user know how to terminate the current execution of the program.

• The program must display a title on the Visual Logic's console.

• Program outputs are displayed on the Visual Logic's console - one line after another, with user-friendly labels.

Expected Submittals

3. The Visual Logic program (50%).

4. Formal pseudocode (following the book syntax, proper indentation, with variable declarations, etc.). Use Notepad++ to create the pseudocode (*.txt file) (50%).

IMPORTANT NOTE 1: If your Visual Logic code uses compound Boolean operators, make sure you read the TIP on page 26, in the Visual Logic book.

IMPORTANT NOTE 2: Test your program with multiple distance values, to insure that the outputs (the corresponding signal strength ranges) are correct. In your design you must consider which signal strength value the program will display, when the distance between a computer and the AP is longer than 125 feet.

Reference no: EM131291734

Questions Cloud

How much money to pursue the project : We are looking for financial justification as to why Winn-Dixe should adopt/expand an/their organic food line and a 5 year financial analysis of it.
Design and implement class called date that has data members : Design and Implement a class called Date that has data members to store month (as a number), day, year, and name of the month. showDate1() should display the date in 1/1/2001 format.
What is the probability that the shop is empty : What is the probability that the shop is empty?- What is the average number of customers in the barbershop?- What is the average time spent in the shop?
Common security weaknesses inherent : What are some of the common security weaknesses inherent in Unix or Linux based systems and what techniques can be used to harden these systems against an attack?
Create a program that estimates the radio signal strength : Create a program that estimates the radio signal strength (%) - a range - for computers stationed at different distances (ft) from the AP. In your design use 5 distance zones, and proportionally assign to them signal strength ranges (%).
Identify the critical components of operations management : Identify the critical components of operations management function in differing organisations and clearly demonstrate their relationship to decision making and value chain.
Calculating the price of pizzas : This assignment will involve modifying that application to include calculating the price of pizzas. Assumethat the price of a small pizza is $10.95, the price of a medium pizza is $13.95, and the price of a largepizza is $16.95.
Explain the causes of variations in growth : Briefly explain in one paragraph (10 sentences) the causes of variations in growth during the preschool years.
Request without sending to the authoritative server : When does a domain name server answer a request without sending to the authoritative server?

Reviews

Write a Review

Computer Networking Questions & Answers

  Selecting the network

She has bids from several companies in order to install (1) Wi-Fi, or (2) a switched Ethernet 100 Base T network. She wishes you to provide her some sense of relative performance of the alternatives so that it may be related to the costs of each o..

  A large environmental organization

A large environmental organization that provides services suchs as water quality monitoring and geological surveys to businesses and government agencies across the nation, needs help designing its corporate WAN

  Router traffic classification proof of concept

Router Traffic Classification Proof of Concept, Write a paragraph (minimum five college-level sentences) below that summarizes what was accomplished in this lab and what you learned by performing it

  Discuss the benefits of cloud computing at riordan

Explain the Benefits of Cloud Computing at Riordan. A full description of the new system, a description of its components, and the benefit it will provide to Riordan.

  What is still need to be completed main referencesr

7502ICT - Advanced Networking: Project. In order to keep track of the progress of the project, you will have to submit an interim progress report describing (a) brief overview of the project (b) what work has been completed so far and (c) what is s..

  Compute the result of an add immediate 150 instruction

Compute the result of an ADD IMMEDIATE 150 instruction and Compute the result of an ADD DIRECT 150 instruction

  Analyze and identify the fundamentals of pki

Analyze and identify the fundamentals of PKI in writing and depict graphically using MS Visio or its open source alternative software. Note: The graphically depicted solution is not included in the required page length

  Why is it important to select student interface in wireshark

How does Wireshark differ from NetWitness Investigator? Why is it important to select the student interface in the Wireshark? What is the command line syntax for running an Intense Scan with Zenmap on a target subnet of 172.30.0.0/24?

  Modules in c functions

Modules in C are called functions. C programs are typically written by combining user-created functions as well as "pre-packaged" functions found in the C Standard Library.

  Network management system on acurrently-dated vendor website

Write a two-and-a-half-page paper explaining network management system identified on acurrently-dated vendor website (Cisco, HP, Sun, SolarWinds, CA, Network General, IBM, etc.).

  Expiration and garbage collection timersare

Router X does not receive any update for another 90s.  How many periodic, expiration and garbage collection timersare now running in router X?

  Dbms consider a movie database in which data is recorded

consider a movie database in which data is recorded about the movie industry. the data requirements are summarized as

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd