Mobile Internet Technology

This project received 4 bids from talented freelancers with an average bid price of $826 USD.

Get free quotes for a project like this
Project Budget
Total Bids
Project Description


My manage asked me to do the folowing tasks, is any one could help me with that:

Enquiry 1

By experimentation, work out the lowest SNR, under which 4 users can simultaneously

communicate, without error, via this system. For SNR, simply report the

largest value for the noise power parameter, in the spreadsheet cell which changes the

strength of the noise. Your answer should include a report on experiments in which the

messages could be repeatedly communicated successfully, and also reports of experiments

in which communication sometimes failed

Enquiry 2

It has become established practice to define network security by means of

rules. These rules can take many different forms. Although security is often concerned

with preventing access, good security requires consideration of other aspects

than merely preventing access. Rules may state what types of service or activity are

not allowed, and also what should be allowed. Rules may take precedence over other


Complete set of rules for the following situations:

(i) A network of wireless access which is provided in a nationwide network of hotels;

(ii) a university campus network (with three types of user – academics, admin, and


(iii) a home wireless network.

In each case, include both positive and negative rules, and also rules which are not simply

about access, and attempt to ensure that the resulting set of rules is unambiguous,

complete, and consistent


In Enquiry1, the SNR at which communication can be achieved for all four sources, by codes, has been found.

Evidence is provided that reliable communication can be conducted, using the given codes, with this level of noise.

Evidence is provided that reliable communication can not be conducted, using the given codes, when the noise is higher than this level.

In Enquiry2, a satisfactory set of rules has been provided for all three situations, including rules which describe what users can do, rules which describe what they can't do,

The issue of how the identity of users should be managed has been addressed in the security rules.

The issue of security rules for administration users has been addressed.

The completeness and consistency of the rules has been satisfactorily discussed.


please have a look on the attached file

Skills Required

Looking to make some money?

  • Set your budget and the timeframe
  • Outline your proposal
  • Get paid for your work

Hire Freelancers who also bid on this project

    • Forbes
    • The New York Times
    • Time
    • Wall Street Journal
    • Times Online