What is the use of employing an ssid mechanism

Assignment Help Computer Engineering
Reference no: EM132126278

Question: 1. In each of the following scenarios there is a relationship to work life in the IT industry. With each of the following question, ensure that your answer includes the explanation of how it would be applied to workplace situations. Write short notes after investigating the following scenarios:

a) 802.11a supports different modulation techniques, each allowing for different data rates. This adds complexity and cost to the radio, so your boss suggests 802.11zzz should only support one modulation technique, namely the maximum data rate possible. Do you support this idea? Why or why not?

b) Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple wireless networks with different SSIDs. What is the use of employing an SSID mechanism, state two reasons as to why it is necessary?

c) You company provides wireless networking services. One of your customers complains about the downloading performance being poor. After investigation, you find that the customer's 802.11 wireless network is interfering with his neighbour's wireless transfers. You want to improve performance, but you do not have any control over the neighbour's wireless connection (The only thing under your control is your customer's wireless router). Discuss the suitability of the following strategies in achieving better performance, e.g., under what conditions could it help, and when may it not be effective.

i. Frequency Assignment - Assigning a different channel to the user's wireless router.

ii. Power Control -- Lowering the transmit power of the user's wireless router.

iii. Enable RTS/CTS

2. Suppose a large office building has ESS WLAN for the office users. As a network engineer, you are asked to identify the drawbacks of the ESS WLAN with respect to roaming users. What would you recommend as a remedy to this drawback, if there any?

3. Explain how does the CSMA/CA in DCF handle media contention.

4. Suppose your company is going to provide services on broadband wireless access networks. For this reason you are asked to perform a comparative study on different technologies of wireless broadband networks. You need to complete the following table based on your study (please replace Technology T with an appropriate technology similar to WiMAX and Wi-Fi, also add few additional features in place of Feature x, y and z):

Feature

WiMAX

Wi-Fi

Technology T

Frequency band

Channel bandwidth

Radio Technology

Half/Full Duplex

Modulation technique

Bandwidth Efficiency

Access protocol

Feature x

Feature y

Feature z

5. Define ‘throughput' in regards to wireless network. Use a practical method (e.g., using an software) to measure throughput of a wireless network? You should provide any appropriate screenshots.

Reference no: EM132126278

Questions Cloud

How much will be in the fund immediately after the 30th : If your first deposit is $7,500 and each successive deposit is 6% greater than the preceding deposit, how much will be in the fund immediately after the 30th
How is the city trying to reconfigure and reshape : Was the industry/company affected by globalization? How did it change and how did the changes affect the city?
How much will jeff have at month 61 : Assuming his investments earn an interest rate of 5%, how much will Jeff have at month 61?
How much was the second payment : (a) How much was the second payment? (b) What is the equivalent uniform series (if she was going to pay the loan in 5 equal payments)?
What is the use of employing an ssid mechanism : Your company wants to provide wireless networking services in public places, such as in an airport lounge, where a wireless networking device detects multiple.
Does bmw have a guided missile corporate culture : Does BMW have a guided missile corporate culture, and incubator corporate culture, a family corporate culture, or an Eiffel tower corporate culture?
Describe the difference between causality and correlation : Ethnographic research is an integral research method for exploring the social world and apprehending social phenomena?
What risks are they running : Imagine you are a consultant brought in by the Subway company's executive leadership to give them advice about their pricing nationwide. What do you tell them
What would be the impact of predictive modeling : What would be the impact of predictive modeling on healthcare and medicine? Can predictive modeling replace managerial or medical personnel?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd