When you set up an 802.11n (2.4GHz) wireless access point in your small business, your aggregate throughput is only about 6 Mbps to some workstations
The following questions are a review of the material we cover in this module and will prepare you for the midterm and final examinations. There is no need to take time retyping the questions, as your responses are the most important part; however, please do mark/number which questions you are answering.
Please read the instructions for assignments carefully and take time to review your work.
And perhaps most importantly, show all of your work and/or fully explain your answers. It is difficult to provide partial credit without this included. Remember, all work should be original and in your own words and/or sources properly cited.
Complete the following questions (show/explain all work):
1. When you set up an 802.11n (2.4GHz) wireless access point in your small business, your aggregate throughput is only about 6 Mbps to some workstations.
Explain which wireless propagation issue may exist for each workstation based on the following causes:
a. Large trees are between the wireless access point and the workstation.
b. The workstation is next to microwave ovens that are used in the business.
c. There is a concrete wall between the workstation and the wireless access point.
d. The workstation having issues is twice as far as the others which are working fine.
2. Describe multipath interface. Why is this the most serious WLAN frequency propagation problem for businesses?
3. You are the network engineer and have been asked to find the root cause for the recent slowdown of wireless network traffic. The slowdown occurred shortly after the new insurance company opened on the floor above and started using their network. What is the most likely issue and why?
4. As the network security administer, you are concerned the wireless network has been compromised even though all of the proper security standards and controls are in place and functioning within specification.
a. Describe what you should be looking for next and why?
b. What devices could be used?
c. Who be the likely hacker?
d. How can you tell the difference between the two types of potential compromises?
5. Referencing the book chapters, use the article Wi-Fi in plant environments: Convenience vs. risk. (Links to an external site.)Links to an external site. and other online sources to answer the following questions:
a. Describe the primary differences between WEP, WPA, and WPA2 protocols.
b. Describe how algorithms enhance the security of the above protocols.
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.