Eliminate interference between access points?

Assignment Help Basic Computer Science
Reference no: EM13899995

Business Data Communication

•A total of six (6) questions. There will be four (4) design/troubleshooting questions and two (2) case study questions that involve applying multiple concepts we have studied.

Question 1.

A friend is interested in installing a wireless LAN in her small business. She has approximately 15 employees who primarily use office automation applications with printers. They do require access to the Internet. The phone system is independent from the data network.

Design a cost effective wireless network option that would provide adequate bandwidth for the business needs, keeping in mind your friend is very concerned about security associated with wireless networks.

Question 2.

For security reasons, many organizations do not allow error reply messages to leave their internal Internets. Specify how could hackers use information in echo reply messages to learn about the firm′s internal hosts? What can they do with this information that could be harmful to the firm?

Question 3.

Two switches are 800 feet apart. They need to communicate at 2.1 Gbps. What network design do you recommend? Justify your answer.

Question 4.

Two switches are 250 meters apart. They need to communicate at 1.6 Gbps. What network design do you recommend? Justify your answer.

Question 5.

You try to access Skype but get no response. List the possible causes and describe how you would test each cause.

Question 6.

Consider a one-story building that is a square. It will have an access point in each corner and one in the center of the square. All access points can hear one another.

a. Assign access point channels to the five access points if you are using 802.11 n. try not to have any access points that can hear each other on the same channel. Available channels are 2, 3, and 9.

b. Were you able to eliminate interference between access points?

c. Repeat the first two parts of the questions, this time using 802.11 a. Available channels are 31, 41, 48, 51, 55, 61, 64, 149, 158, 159, and 161, but many NICs and access points only support channels below 100.

Reference no: EM13899995

Questions Cloud

Compute the percentage of ebitda to total revenues : Compute the percentage of EBITDA to total revenues for 2004. Round to one decimal place after converting to a percentage. Compute the ratio of EBITDA to interest expense for 2004. Round to one decimal place.
Describe the data information decision : Describe the Data Information Decision
Arundel company disclosed the following information : Arundel Company disclosed the following information for its recent calendar year.
Draw the activity network as a gantt chart : Develop the network activity chart and identify the critical path for a project based on the information provided in the Gantt Chart Activity document .Draw the activity network as a Gantt chart.
Eliminate interference between access points? : eliminate interference between access points?
Prepare a trial balance for ingres designs as of july : Post the journal to a ledger of T accounts. For accounts with more than one posting, determine the account balance. Prepare a trial balance for Ingres Designs as of July 31, 2006.
Journalize the transactions for june in a two-column journal : Journalize the transactions for June in a two-column journal. Post the journal entries to the T accounts, placing the date to the left of each amount to identify the transaction.
Identify organizational factors of organizational behavior : Describe the strategic role and purpose of organizational behavior for the company. Identify the organizational factors of organizational behavior for the company
Identify three strategies to sustain the gain : Choose an organization at which you are currently working or a Middle Eastern organization with which you are familiar. Include the following in your analysis: A description of organization

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Draw an e- r data model

Draw an E- R data model for the Garden Glory database schema shown in Chapter 3' s " Garden Glory Project Questions." Use the IE Crow's Foot E- R model for your E- R diagrams. Justify the decisions you make regarding minimum and maximum ­cardinali..

  Write program in java to test the class

In this chapter, the class Date was designed to implement the date in a program, but the method setDate and the constructor with parameters do not check whether the date is valid before storing the date in the data members.

  Explain standards and impact of organizations like oasis

describe the differences in these standards and impact of organizations like OASIS as a growing factor in worldwide standards setting

  Why is security of operation useful

1. Why is security of operation useful to overall information assurance

  Explain performance measures for balanced scorecard system

Explain three specific performance measures which could be utilized in Balanced Scorecard system in industry of your choice.

  Which data input appears on output y

View a datasheet function table for a 74151 device. Using Quartus pin names, assume the chip is enabled and C = 1, B = 0, and A = 0. Which data input appears on output Y?

  Which of these conditions returns true

Which of these conditions returns true? Check the Java documentation for the inheritance patterns.

  Advantages and disadvantages of broadcasting the ssid

The access point (AP) may be configured to broadcast or not to broadcast the SSID (Service Set Identifier). Determine the advantages and disadvantages of broadcasting the SSID. Explain whether or not you would broadcast your SSID.

  Using the division remainder method

Using the Division Remainder Method, give a concrete example of a hash function for a storage array with 10 storage locations addressed 0 through 9. Call your hash function h, define your function mathematically as h(x) = x mod 10

  Solve the recurrence using the recursion trees method

Guess and prove by induction method - Solve the recurrence using the recursion trees method.

  Determine the value of the following expressions

Determine the value of the following expressions.

  When deleting elements from a hash table with linear probing

When deleting elements from a hash table with linear probing, a special marker needs to be inserted in place of each deleted elements. Give an algorithm to perform deletion without the use of a special marker.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd