Here are some enquiries which need to be solved for my office:
By experimentation, work out the lowest SNR, under which 4 users can simultaneously communicate, without error, via this system. For SNR, simply report the largest value for the noise power parameter, in the spreadsheet cell which changes the strength of the noise. Your answer should include a report on experiments in which the messages could be repeatedly communicated successfully, and also reports of experiments in which communication sometimes failed.
It has become established practice to define network security by means of rules. These rules can take many different forms. Although security is often concerned with preventing access, good security requires consideration of other aspects than merely preventing access. Rules may state what types of service or activity are not allowed, and also what should be allowed. Rules may take precedence over other rules.
Complete set of rules for the following situations:
(i) A network of wireless access which is provided in a nationwide network of hotels;
(ii) A university campus network (with three types of user – academics, admin, and students);
(iii) A home wireless network.
In each case, include both positive and negative rules, and also rules which are not simply about access, and attempt to ensure that the resulting set of rules is unambiguous, complete, and consistent.
• In Enquiry 1, the SNR at which communication can be achieved for all four sources, by codes, has been found.
• Evidence is provided that reliable communication can be conducted, using the given codes, with this level of noise.
• Evidence is provided that reliable communication cannot be conducted, using the given codes, when the noise is higher than this level.
• In Enquiry 2, a satisfactory set of rules has been provided for all three situations, including rules which describe what users can do, rules which describe what they can't do,
• The issue of how the identity of users should be managed has been addressed in the security rules.
• The issue of security rules for administration users has been addressed.
• The completeness and consistency of the rules has been satisfactorily discussed.