What is a survey

Assignment Help Computer Networking
Reference no: EM13320031

Suppose you work in a network security company, and you need to prepare a survey report of a particular security issue of wireless networking. To start with, select an area of wireless network security. We have listed some papers in the 'recommended reading/resources' part of the Subject Outline, which can be helpful in choosing a topic. You need to use more papers in your selected topic too. This project may be done in teams of 2-3 students. Active participation in the online meeting and on the Forum will help identify like minded team members. Please write all team members names and student IDs on the title page of report. You may choose to work on your own as well.

What is a survey?

The goal of a survey is to give a broad, structured overview of a specific area.

For example, suppose you are working for a company that is exploring a new wireless technology or market, so employees and management are very not very familiar with this new area. You could be asked to prepare a written report and a 30 minute presentation to introduce to area, highlighting different approaches, challenges, opportunities, and risks.

A survey is different from a set of paper summaries. The survey should focus on presenting the "big picture" using the papers as examples. For each topic, we have identified about three papers to get you started, but we generally expect that you will have to consult additional materials. Examples may be papers cited in the original papers, material found on the web, or results from online libraries, like IEEE Explorer, or the ACM portal.

There is no strict template to be followed for this report. However, you may use the following- abstract/executive summary, importance of your security issue, state-of-the art, how the researchers are addressing the issue, which direction the research is going, the probable future research direction, conclusion/your comments, and references.

Reference no: EM13320031

Questions Cloud

How to calculate the value of the ksp : A saturated solution of magnesium hydroxide in equilibrium with undissolved solid is prepared at 25C. The pH of the solution is 11.03. Calculate the value of the Ksp
What are the successful-effort and full-costing methods : What are the successful-effort and full-costing methods? What are the effects on balance sheet and income statement?
Explain what is the ph of the solution of naoh : A 30.0 mL sample of 0.30M HClO (aq) is titrated with 0.20 M NaOH (aq). Ka of HClO is 3.5*10^-8. What is the pH of the solution when 5.0 ml more of NaOH is added in the titration.
Find principle stresses and max shearing stresses in beam : A circular beam length 36 inches and diameter 1 inch is supported on the left end by a pin joint and the right end with a roller. The beam is under axial tension with forces of 1000 lbs out of each end.
What is a survey : How the researchers are addressing the issue, which direction the research is going, the probable future research direction, conclusion/your comments, and references.
What should the asset value : What should the asset value of this property be on the balance sheet?
Find the number of turns in the solenoid : A certain superconducting magnet in the form of a solenoid of length 0.520 m can generate a magnetic field of 9.10 T in its core when its coils carry a current of 80 A
Determine what will be the effect on its biological process : Please let me know whether we can cover these facilities or not and what is micro-biological process in these. If we can provide cover than what will be the effect on its biological process.
How much charge ends up on sphere : Consider three identical metal spheres, A, B, and C. Sphere A carries a charge of -4q. Sphere B carries a charge of -9q. How much charge ends up on sphere C

Reviews

Write a Review

Computer Networking Questions & Answers

  Create ip addressing scheme for five departments

You are hired to create the IP addressing scheme for five departments which will give security and access to Internet. Each department needs between 1,500 - 2,000 IP addresses.

  Information security and disaster recovery

Explain which concepts are the most significant to consider when designing information security policies and procedures.

  Explain are lans a stable technology or changing

Are LANs a stable technology or are they changing just as rapidly as other forms of communication technologies? Should software licenses be dropped completely?

  Explain all potential security threats on personal computer

Computer security is not the issue for organizations alone. Anyone whose personal computer is connected to the network or Internet faces the potential risk of attack.

  Determine performance of upgraded processor

If 30% of instructions need one memory access and another 5% need two memory accesses per instruction, determine the performance of upgraded processor with compatible instruction set.

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Why do we pursue technologies

Why do we pursue technologies, such as those associated with virtual reality? Going back to one of our definitions of technology, what problem are we trying to solve? What are the risks associated with these technologies?

  Task of determining available wireless methods

You have been assigned th task of determining the available wireless methods that could be used to connect buildings to each other and presenting these options to executive team.

  Find required bandwidth for transmission of video stream

A frame rate of 30 fps, and 8 bits for quantisation of each pixel. What is the required bandwidth for the transmission of the uncompressed video stream?

  Determine distinct canonical names required-ip multicasting

Let N users participating in the audio/video conference by using IP multicasting. Each user is equipped with the microphone, camera, and speakers. How many distinct canonical names are required?

  Compute actual maximum channel capacity

Given narrow (usable) audio bandwidth of telephone transmission facility, a nominal SNR of 56dB (400,000), and a distortion level of <0.2%. Determine actual maximum channel capacity?

  Expected time to find passwords using dictionary attack

Determine the expected time to find all users' passwords using dictionary attack? suppose that eight more characters were added to password and that DES algorithm was changed so as to use all 16 password characters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd