Closed

Mobile Internet Technology

This project received 4 bids from talented freelancers with an average bid price of $826 USD.

Get free quotes for a project like this
Employer working
Skills Required
Project Budget
N/A
Total Bids
4
Project Description

Hi,
My manage asked me to do the folowing tasks, is any one could help me with that:

Enquiry 1
By experimentation, work out the lowest SNR, under which 4 users can simultaneously
communicate, without error, via this system. For SNR, simply report the
largest value for the noise power parameter, in the spreadsheet cell which changes the
strength of the noise. Your answer should include a report on experiments in which the
messages could be repeatedly communicated successfully, and also reports of experiments
in which communication sometimes failed
Enquiry 2
It has become established practice to define network security by means of
rules. These rules can take many different forms. Although security is often concerned
with preventing access, good security requires consideration of other aspects
than merely preventing access. Rules may state what types of service or activity are
not allowed, and also what should be allowed. Rules may take precedence over other
rules.
Complete set of rules for the following situations:
(i) A network of wireless access which is provided in a nationwide network of hotels;
(ii) a university campus network (with three types of user – academics, admin, and
students);
(iii) a home wireless network.
In each case, include both positive and negative rules, and also rules which are not simply
about access, and attempt to ensure that the resulting set of rules is unambiguous,
complete, and consistent








Criteria

In Enquiry1, the SNR at which communication can be achieved for all four sources, by codes, has been found.

Evidence is provided that reliable communication can be conducted, using the given codes, with this level of noise.

Evidence is provided that reliable communication can not be conducted, using the given codes, when the noise is higher than this level.

In Enquiry2, a satisfactory set of rules has been provided for all three situations, including rules which describe what users can do, rules which describe what they can't do,

The issue of how the identity of users should be managed has been addressed in the security rules.

The issue of security rules for administration users has been addressed.

The completeness and consistency of the rules has been satisfactorily discussed.
.



please have a look on the attached file

Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online