Structural engineers use wireless sensor networks to monitor the
condition of dams and bridges. An article describes an experiment
in which accelerometers were placed on the Golden Gate Bridge for
the purpose of estimating vibration modes. For 18 vertical modes,
the system was underdamped (damping ratio < 1). Following are
the damping ratios and frequencies for those modes.
Damping Ratio
Frequency (Hz)
Damping Ratio
Frequency (Hz)
0.3
2.72
0.5
1.98
0.3
2.84
0.6
0.77
0.3
3.77
0.6
1.26
0.4
2.07...
Discuss issues pertaining routing algorithm in Wireless Sensor
Networks. State and describe three routing algorithms with relevant
example of their applications.
Wireless Sensor Networks/Internet of Things
Considering sensors and signal processing (based on in-class
materials or your own knowledge if you have a background here) how
would you determine if the entity in your sensor field was an
elephant or a lion
The Ethernet standard uses CSMA/CD as a MAC protocol, whereas
the WiFi networks uses
CSMA/CA. Consider you are using your Home LAN mostly for
transferring streaming media
such as video, audio, and playing online games. Analyze your
knowledge of medium access
control protocols and point out which protocol would you use? Do
justify ?
Wireless Medical Sensor Network (WMSN)
What a computer network is and what is the importance of the
computer network to this topic (Wireless Medical Sensor
Network)?.
Explain how a Wireless Medical Sensor Network (WMSN) differs
from a Wireless Sensor Network (WSN). What kind of devices does it
consist of? What kind of data do the devices collect? Please
include information about authentication, user friendliness and
user anonymity.
1) Describe what a VLAN is and how it might be important with
wireless networks.
2) Explain why packet filtering alone is inadequate as the only
form of firewall.
3) Describe the role of a DMZ when talking about perimeter
firewalls.
4) Describe what a “Proxy Server” is and how it is used with
firewalls.
5) Explain the role of a “personal “ firewall on a corporate
network where there is a robust perimeter firewall.
...