Compare a wireless radio system with a fiber-optic communication
system for digital data communications over a distance of 1 km.
Assume a desired data rate of 75 Mbps. Give pros and cons,
advantages and disadvantages of each. Which one would be better,
all factors being considered?
True or False? Wireless ad hoc networks are distributed
networks that work without fixed infrastructures and in which each
network node is willing to forward network packets for other
network nodes.
4. True or False? WEP is designed to
protect linkage-level data for wireless transmission by providing
confidentiality, access control, and data integrity, to provide
secure communication between a mobile device and an access point in
a 802.11 wireless LAN.
5. True or False? The WPA standard is
aimed at...
a) Discuss the benefits of wireless network communication with a
simple example.
b) Explain why wireless network communication is slower than
wired network communication on most occasions.
c) Wireless bridges are gaining popularity in connecting
discrete campuses or business premises. Discuss the advantages and
disadvantages of wireless bridges.
Create a Wireless Security Policy document. Refer to the
Wireless Communication Policy example located within the required
readings as a template. Make sure to address the following:
Describe if the wireless network will be on a different subnet
to protect your wired network.
What type of encryption will be utilized, including the
attributes of the encryption methodology? What kind of logon
security will be employed to keep unauthorized users out of your
network?
Then, in 250 words, summarize your findings...
Create a Wireless Security Policy document. Refer to the
Wireless Communication Policy example located within the required
readings as a template. Make sure to address the following:
Describe if the wireless network will be on a different subnet to
protect your wired network. What type of encryption will be
utilized, including the attributes of the encryption methodology?
What kind of logon security will be employed to keep unauthorized
users out of your network? Then, in 250 words, summarize your
findings...