Q1 Page 1 of 4 ITECH2300 Mobile Network & Wireless Communication Assignment 2 – Semester 2 2020 Submission Guidelines  Deadline: Sunday 11 October, XXXXXXXXXX:55pm midnight on Moodle)  Submission...

1 answer below »
I have attached the file


Q1 Page 1 of 4 ITECH2300 Mobile Network & Wireless Communication Assignment 2 – Semester 2 2020 Submission Guidelines  Deadline: Sunday 11 October, 2020 (11:55pm midnight on Moodle)  Submission format: PDF only. You can use any freely available pdf converter to make pdf file from editable one.  Submission platform: upload via Moodle on course website  Files to submit:  You need to submit only one file: Assign2(student_id).pdf  Create a single file that contain answer to all questions  No late submissions unless SPECIAL CONSIDERAION IS PROCESSED Plagiarism: It is an academic requirement that your submitted work be original. Zero marks will be awarded for the whole submission if there is any evidence of copying, collaboration, pasting from websites, or copying from textbooks. –Plagiarism policy applies to all assessments Marks • This assignment is worth 20% of the total marks. • The assignment is marked out of 50 nominal marks. • For example, if you obtain 30 marks for this assignment, it will contribute (30/50)*20=12 marks to you final grade. https://federation.edu.au/current-students/learning-and-study/online-help-with/plagiarism https://federation.edu.au/current-students/learning-and-study/online-help-with/plagiarism Page 2 of 4 Assignment Questions Part –A Q1. In relation to access to wireless network (e.g, WiFi), answer the following questions: a. What is media access control and why is it important? b. Give one example each of the controlled access methods and contention based media access methods? c. When might one access method be preferred over another in a network, and why? d. Under what conditions do contention‐based media access control techniques outperform controlled‐access techniques (i.e., have lower response time)? Explain. [3+2+2.5+2.5=10 marks] Q2. Four users (U1, U2, U3 and U4) are using CDMA access techniques to transmit data to their respective receivers (U1->R1, U2->R2, U3->R3 and U4->R4). The followings are the spreading codes and the data that each user wants to send. Users Spreading code Data to send U1 1 1 1 1 1 0 1 U2 0 0 1 1 1 1 0 U3 1 0 0 1 0 0 0 U4 1 0 1 0 0 1 1 Using a spreadsheet similar to the one shown in Week 7 tutorial, (a) show the composite signal that each receiver will receive; (b) show how each receiver can retrieve its own data using the corresponding spreading code. Note: encode ‘1’ in data as ‘+1’ and ‘0’ in data as ‘-1’ for this work. [6+4=10 marks] Page 3 of 4 Q3. Use internet resources and describe the Australian Academic and Research Network’s (AARNet) national and international network with diagram and information about the speed and the coverage. Describe how AARNet is connected to the Internet in Australia and overseas. Your description should be of minimum 500 words. [7+3=10 marks] Q4. Compare and contrast the WiFi IEEE 802.11ax standard and latest Bluetooth standards. Your comparison should be based on technical specification and performance (e.g., data rate, modulation, range, no of channels and MIMO antenna, security features and other parameters; you should list as many as you can). Do you view WiFi and Bluetooth as competing or complimentary technologies? Justify your answer. [5+3=7 marks] Part B – Scanning Wireless Access Points [Total 13 marks] Q5. The software inSSIDer from metageek lets you scan surrounding WiFi networks. Download inSSIDer 3.1.2.1 from the following link: http://www.techspot.com/downloads/5936-inssider.html a. Investigate wireless networks surrounding you home. Use the inSSIDer package installed on your laptop and walk through inside your home, and your front yard and backyard. Record the wireless networks available in at least two spots (make sure you cover different distance from your own access point). Capture the inSSIDer screen shots. Page 4 of 4 Give the list of available networks/access points including their technical characteristics like channel number, signal (SNR, signal to noise ratio in dB), security, etc. Include your screenshots from the software. Make some observations based on the data you collected, like, how do you relate SNR with the distance (from your own location to access points), overcrowded channels (i.e., multiple networks are transmitting using the same set of channels), etc. b. Can you suggest any way to change your access point’s (i.e., home router’s) transmission setting to get better reception within your home? [10+3=13 marks] ITECH2300 Submission Guidelines
Answered Same DayOct 08, 2021Federation University Australia

Answer To: Q1 Page 1 of 4 ITECH2300 Mobile Network & Wireless Communication Assignment 2 – Semester 2 2020...

Amit answered on Oct 10 2021
141 Votes
Title of the assignment:
Student’s name:
Student ID:
Professor’s name:
Course title:
Date: 10/10/2020
Table of Contents
1.    Part -A    3
2.    Question 1    3
3.    Question 2    4
4.    Question 3    8
5.    Question 4    10
6.    Part B: scanning wireless access points    11
7.    References:    14
1. Part -A
2. Question 1
a)
The con
trol which are required to handle the message sent operations are called MAC (Media access controls). The MAC are very important because:
· When identical circuit is used by different computers for message transmission.
· To maintain controlled access to messages and their contention.
· To assure that data transmission not occur during identical time by two systems.
b)
The required examples are pointed below:
· Control access method: In this method, the channel is being controlled by mainframe and channel allocation time is decided by it. For example FDMA.
· Contention based media access method: In this method, the transmission is only possible when the channel is free. Till that the node has to wait. For example, CSMA.
c)
The point showing conditional selection of access method in place of other are provided underneath:
· The resource allocation and required throughput helps in selection of access method.
· With small network which is having low chances of collision, then, contention method will be preferred. The polling delay can be afforded in such networks.
· But when network is large and high stability is required, then, controlled method will be selected. The high throughput with minimum chances of collision can be maintained with this method in large network.
d)
The technique of controlled access can be replaced by contention method when:
· Low uses small network is developed.
· When permission to perform transmission is not required.
· When waiting poll is not affecting the network performance.
3. Question 2
a)
The XNOR will be implemented for the spreading code and sent data. Thus, for first user (U1), it is given:
Thus,
Thus, first user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For second user (U2), it is given:
Thus,
Thus, second user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For third user (U3), it is given:
Thus,
Thus, third user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
For fourth user (U4), it is given:
Thus,
Thus, forth user (U1) is maintaining following spread signal
Now, 0 is being replaced with -1 and 1 will be replaced with +1. So, the resulting signal will be:
Thus, composite signal which will be received by all these four users will be:
-----------------------------------------------
b)
For first user (U1), it is given:
composite signal=
Thus,
Thus signal is received to user 1.
For second user (U2), it is given:
Thus signal is received to user 2.
For third user (U3), it is given:
Thus signal is received...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here