Why are wireless transmissions being lost in transit

Assignment Help Computer Engineering
Reference no: EM132182798

Wireless Networking Concepts:

Your company recently rented new office space across town to make room for expansion in the Accounting Department, and part of your responsibility with the new acquisition was to install three new 802.aan Aps. You completed the job just before the weekend, at the same time as the 19 accounting employees finished setting up their file cabinets and reception area furniture.

Some of your fellow IT technicians completed workstation setup that same day; most of the workstations are connected to the network via wireless due to restrictions imposed by your company's contract with the property owner. Today, Monday, the accounting personnel reported for work at the new building.

At first, the new location's network seems to be working fine. The local network is communicating well with the home office's network, and everyone has access to all of the files they need on the file servers. As everyone gets settled in for the day and stats their Monday duties, however, the network slows to a snail's pace.

It's not long before you start to get complains about emails being delayed, files not being accessible, and print jobs to network printers getting lost. You make a beeline across town to figure out what's wrong.

During the course of your investigation, you find that all of the hosts on the local network ae accessible, although you find it odd that even though you ping tests ae usually successful, sometimes they aren't. You know the Aps are all new devices, and you double-check their configurations to try to determine a common source for all the problems you've noted.

Here's a summary of the results you've gathered:

All three APs are active and communicating successfully with your laptop.

All three APs are configured with identical SSIDs and other settings.

For good measure, you also walk around the office space with your wireless analyzer to confirm that there are no significant dead zones or interference.

Why are wireless transmissions being lost in transit? Below are several possible resolutions.

Select the best one and explain your reasoning:

a. One of the APs is faulty and not processing transmissions. It should be removed and replace.

b. The NICs in the employee's workstations were damaged during the move. Probably several just need to be reseated while some might need to be replaced.

c. The APs should not have the same SSID. Rename each AP so their SSIDs don't match.

d. Three APs ae insufficient for the wireless load of the Accounting Department. More APs should be added

e. The APs are all part of the same LAN and should be separated into separate LANs.

f. The workstation computers are programmed to search for and connect with the wrong SSID, or the network keys are entered wrong. Every workstation's wireless interface settings should be checked.

The APs are all programmed to use the same channel. They should be programmed for different channels.

Reference no: EM132182798

Questions Cloud

Write a program that reads in from a file two month names : Write a C++ program that reads in from a file two month names, followed by the rainfall amounts for each month in that span of months.
Compression and analog to digital process : Without quantization is there any possibility of losing some amount of information in compression and analog to digital process?
Create and use a subroutine that takes single character : Create and use a subroutine that takes single character parameter and displays a count of the number of environment variables that start with the subroutine.
Compute the number of words-lines in the input file : Compute the number of words/lines in the input file and print the result to the output file. 4. Document the program using Python comments.
Why are wireless transmissions being lost in transit : For good measure, you also walk around the office space with your wireless analyzer to confirm that there are no significant dead zones or interference.
How do these two frequencies differ in use : WLANs operate in two of the three common unlicensed radio frequency bands. What are these two frequencies?
Explain fully how you obtained your solution : Without using a computer decrypt the following ciphertext which has been encrypted using an affine substitution cipher.
Examine the radio button for military veteran : Write a function that will examine the radio button for military veteran as well as the text field for age.
Provide implementation and documentation comments : In this assignment, you are required to generate the Gray code for n bits using the recursive reflex-and-prefix method as described in the article.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd