Define throughput in regards to wireless network

Assignment Help Computer Networking
Reference no: EM13318167

1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to workplace situations. Write short notes after investigating the following scenarios:

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router. 
ii. Power Control -- Lowering the transmit power of the user's wireless router. 
iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadband wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

 

 

 

Channel bandwidth

 

 

 

Radio Technology

 

 

 

Half/Full Duplex

 

 

 

Modulation technique

 

 

 

Bandwidth Efficiency

 

 

 

Access protocol

 

 

 

Feature x

 

 

 

Feature y

 

 

 

Feature z

 

 

 

5. Define 'throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

6. Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

Reference no: EM13318167

Questions Cloud

What is the voltage across the resistor : A 700 omega and a 2300 omega resistor ar econnected in a series with a 12-V battery. What is the voltage across the 2300 omega resistor
Compute the acceleration at the moment the train speed : A train slows down as it rounds a sharp horizontal turn, going from 80.0 km/h to 58.0 km/h in the 13.0 s that it takes to round the bend. Compute the acceleration at the moment the train speed reaches 58.0 km/h
Explain what is the pressure of the mixture : 1.2 mol of helium is mixed with 2.3 mol of argon in a volume of 1.0L and a temperature of 25.0C. Assuming that helium and argon are perfect gases, what is the pressure of the mixture
How far would the launching machine slide on the moon : The question below was asked before, but this seems to ignore that the launching machine should have static friction as well, How far would the launching machine slide on the Moon
Define throughput in regards to wireless network : Define throughput in regards to wireless network and use a practical method to measure throughput of a wireless network? You should provide any appropriate screenshots.
Compute the volume in ml of 1.2 mol of a perfect gas : Calculate the volume (in mL) of 1.2 mol of a perfect gas at 25.0C and a pressure of 1.02 atm.
Determine speed of block after it has compressed the spring : a 20 kg block slides along the rough surface for which the coefficient of kinetic friction is 0.2. The block strikes a nonlinear spring with a speed of v=4.5 m/s. The spring is termed "nonlinear" because it has resistance of Fs=ks^2
Determine at what rate is the energy being dissipated : A coil has an inductance of 0.45 H and a resistance of 42 ohms. The coil is connected to a 5.6 V ideal battery. At what rate is the energy being dissipated
Compute the transverse speed and acceleration : A transverse wave on a string is described by the wave functionA transverse wave on a string is described by the wave function y=(0.120m)sin((pi*x)/8 +4*pi*t). Determine the transverse speed and acceleration

Reviews

Write a Review

Computer Networking Questions & Answers

  Find out about desktop virtualisation

Describe your reasoning for choosing the Virtualisation technology and what advantages this technology gives you in this scenario?

  Explain the network management software components

Describe the network management software components. Side server components, middleware components and northbound interface.

  Does vc or datagram architecture have more traffic overhead

Suppose that the links and routers in the network never fail and that routing paths used between all source/destination pairs remains constant. In this scenario, does a VC or datagram architecture have more traffic overhead. Why?

  Prevent from the loss of confidentiality caused by malware?

1. Cybercirminals can use malware to steal files and information from computer, if this happens have loss of confidentiality. Explain how antivirus can be help to prevent from the loss of confidentiality caused by malware?

  Explain how you would go about using a viral campaign

Explain how you would go about using a viral campaign for your business and write a few sentencescomparing the results of the two search engines and explain the two results - why do you think they were similar/different?

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  What is meant by router interfaces with ssh listening

What is meant by router interfaces with ssh listening on the internet.

  Advantages-mobile computing technology to monitor patients

Analyze the advantages and disadvantages of using mobile computing technology to monitor patients.

  Implementing filter in the firewall

Consider yourself as the network security technician. Your internetwork connects six buildings through fiber links. You have experienced the numerous attacks on your corporate Web server.

  What information in packet does switch use to find link

When one of these packets arrives to packet switch, what information in packet does switch use to determine link onto which packet is forwarded?

  Find finish actual packet completion-order of transmission

Arrival at time t = 1, length 3; arrival at t = 2, length 1. Buffer 3: arrival at time t = 3, length 5. You need to find out the finish tag, order of transmission and actual packet completion times for each packet arrival.

  Select the hardware and software components to build the lan

Select the hardware and software components to build the LAN. Make sure you do not select two different components to perform the same function.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd