Design a simple layout of omni directional antennas

Assignment Help Computer Networking
Reference no: EM13335365

Wireless Networks

Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.

(a) Assume that the useful range of WiFi within the warehouse will be 15m radius. Design a simple layout of omni directional antennas to cover the entire warehouse. Show the channel to be assigned to each antenna, taking care to minimise interference between the coverage areas. Briefly explain any key design decisions you have made. [1 diagram, up to 150 words]

(b) Which WiFi flavour (a, b, g, n, ac, ad, or other) would you recommend for this new installation? Discuss the options and justify your choice. [Up to 200 words]

(c) Would you recommend security for this network, and if so, what type of security?

Discuss the options and justify your choice. [Up to 200 words]

 

Reference no: EM13335365

Questions Cloud

Sketch the existing wan : What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]
Determine what is the value of g to pay a year-end : a company is expected to pay a year-end dividend of $3 a share(so d1= $3). The stock currently sells for $30 a share. The required rate of return on the stock is 16%. what is g
Discuss the advantages and disadvantages of each approach : A backbone network can be constructed as a switched backbone, a routed backbone or a VLAN backbone. Each of these approaches has its advantages and disadvantages.
What is the current stock price at the end of the year : a stock's expected dividend payment at the end of the year (d1) is $1. the required rate of return is r(s)= 11%, and the growth rate of the dividend is constant at 5%. what is the current stock price
Design a simple layout of omni directional antennas : Consider a warehouse that is 60m by 30m. Wireless networking is required so that up to 20 staff members working in the warehouse can track stock movements and perform stock checks using mobile devices.
Explain what is boyle''s law constant if a sealed rigid : what is Boyle's law constant if a sealed rigid container with a volume of 650 mL has a pressure of 131.1 kPa
How much accumulated interest and principal will they have : Leon and Heidi decided to invest $3,000 annually for only the first eight years of their marriage. The first payment was made at age 25. If the annual interest rate is 10%, how much accumulated interest and principal will they have at age 65?
What is the maximum data capacity for traffic : What is the maximum data capacity for traffic between Hornsby and North Ryde? What is the maximum data capacity for traffic between Hornsby and the City store? [Short answer]
Explain the concentration of the dye in a solution : what is the concentration of the dye in a solution with a percent transmittance reading of 45.8% at 640 nm

Reviews

Write a Review

Computer Networking Questions & Answers

  Storage systems increasingly rely on the internet

Storage systems increasingly rely on the Internet infrastructure as a transport medium. What are the advantages of this approach? What problems are present in terms of security and reliability?

  Explain about backbone networks

Discuss the advantages and disadvantages of each approach and describe an example of a situation where a switched backbone would be preferred.

  Two hosts, a and b, are separated by 20,000

two hosts, A and B, are separated by 20,000 kilometers and are connected by a link of R=2 Mbps, and there are 4 routers between A and B. Suppose the propagation speed over the link is 2.5*108 meters/sec, average queueing time is 2ms,

  How is this applied to changing the coding?

when writing a linear cipher using n = 27, if a = ?, b = ? and c = 7, if ac = 1(mod27) how is this applied to changing the coding?

  Create variant of kerberos in which workstation generate tgt

Create variant of Kerberos in which the workstation generates TGT. TGT will be encrypted with user's master key rather than KDC's master key.

  Threat, risk and vulnerability

Threat, Risk and Vulnerability are related to Cybersecurity. Describe these three terms and provide a business case example.

  How rdp file includes settings you configured in client

How can you tell from this experience that the RDP file includes the settings you configured in the client before you created the RDP file?

  Explain information security body of knowledge

Look for the information security body of knowledge(CBK). When you review list of 10 areas in CBK, is policy listed? why do you think this is so?

  Design a solution to problem using private vlans

Design a solution to this problem using private VLANs - submit a synopsis of the solution, a diagram and the commands that you would use.

  Is the web is changing users collectively or individually

Is the Web (and Web multimedia) is changing users collectively or individually in profound or superficial ways? Can we see new cultural values being shaped or sub-cultures being formed which may permanently affect our cultural values?

  Build a small network using three switches

Build a small network using three switches and one router and one switch will run as a distribution layer switch, the other two will run as access layer switches

  Shows a cdma example that supports two senders

It shows a CDMA example that supports two senders. Suppose that the receiver wanted to receive the data being sent by sender

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd