Structural engineers use wireless sensor networks to monitor the
condition of dams and bridges. An article describes an experiment
in which accelerometers were placed on the Golden Gate Bridge for
the purpose of estimating vibration modes. For 18 vertical modes,
the system was underdamped (damping ratio < 1). Following are
the damping ratios and frequencies for those modes.
Damping Ratio
Frequency (Hz)
Damping Ratio
Frequency (Hz)
0.3
2.72
0.5
1.98
0.3
2.84
0.6
0.77
0.3
3.77
0.6
1.26
0.4
2.07...
Discuss issues pertaining routing algorithm in Wireless Sensor
Networks. State and describe three routing algorithms with relevant
example of their applications.
The Ethernet standard uses CSMA/CD as a MAC protocol, whereas
the WiFi networks uses
CSMA/CA. Consider you are using your Home LAN mostly for
transferring streaming media
such as video, audio, and playing online games. Analyze your
knowledge of medium access
control protocols and point out which protocol would you use? Do
justify ?
Wireless IEEE 802.11 LANs can use either CSMA/CD or CSMA/CA access methods; however, CSMA/CA is preferred since it eliminates all data collisions between nodes.
True
False
“1GBaseT” is a separate standard that competes with “IEEE 802.3”. i.e., 1GBaseT is not compatible with IEEE 802.3.
True
False
IEEE 802.3 Ethernet only describes the OSI RM data link layer specification over UTP.
True
False
1) Describe what a VLAN is and how it might be important with
wireless networks.
2) Explain why packet filtering alone is inadequate as the only
form of firewall.
3) Describe the role of a DMZ when talking about perimeter
firewalls.
4) Describe what a “Proxy Server” is and how it is used with
firewalls.
5) Explain the role of a “personal “ firewall on a corporate
network where there is a robust perimeter firewall.
...
what is your opinion on this?
Should companies use wireless technology for their
networks?
The use of wireless technology would be useful as it can
promote cost-efficient measures as wireless networks are less
expensive due to fewer cables being used and it’s extremely
flexible because workers can still do work while away from the
office. However, there’s more of a risk of being exposed to
attacks, and speeds may be significantly slower than a wired
network.
What limits should be...
What are two types of encryption for wireless networks? Which
encryption standard is considered to be more secure? Why?
The property written in the format 00:00:00:0A:0B:0C for a
device is called its ______________.
Why should you disable the SSID on a wireless network?
What is an evil twin attack?
Why would you disable a Bluetooth device when you are in a
public place?
What happens when you jailbreak or root a device? What potential
problems are caused by jailbreaking or...