Verified Document

Computer Engineering And Information Systems Case Study

it's the same with a Wi-Fi network, where the higher the frequency and the more data is communicated via the wave, the more the actual performance of the RF plane changes. And just like an RF plane that can take in very high frequencies of waves while others will bounce off the device or begin to have properties like light waves (meaning they refract and reverberate) the same holds true for Wi-Fi signals. If you have ever flown an RF plane you can relate to this allegory and its implications on the distance a plane can travel, navigated by the signal from the control unit and the strength of the signal waves. The same is true of a Wi-Fi network. The stronger the frequency of a LAN as measured in kHz, the farther a signal can travel and the larger the potential LAN can be. And just as a signal being sent to an RF plane will dissipate over time, the same holds true for a Wi-Fi network. This property of a network signal losing speed is called attenuation. Many times companies such as yours will use repeaters or a device that allows the Wi-Fi signal to be strengthened and sent forward to other parts of the network. In addition to attenuation there is also the aspect of physical limitations...

In wireless networks, these physical limitations are defined more by the electrical power of the device. In wired networks it is the length of the cable and distance between repeaters or those devices that re-amplify and strengthen the signal.
One final consideration is the frequency you want to have the Wi-Fi network run at, keeping in mind the higher it is, the further the single will carry, yet the more expensive it will be to support. Just like having a state-of-the-art RF plane, the best one could be thousands of dollars just for the electronics. The same holds true with Wi-Fi networks, with the 200 kHz networks being mainstream and the microwave class having speeds of 200 THz or higher. As with many decisions "more power' may not always be the best idea, yet picking a solution that best fits your company's needs. Given the fact that so many of your employees are using laptops and are continually moving around the building, I highly suggest Wi-Fi for the mobility aspects alone.

References

Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Association for Computing Machinery.Communications of the ACM,…

Sources used in this document:
References

Varshney, U., & Vetter, R. (2000). Emerging mobile and wireless networks. Association for Computing Machinery.Communications of the ACM, 43(6), 73-81.
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Security Information in the 21st Century,
Words: 599 Length: 2 Document Type: Essay

Computer Security Information In the 21st century, information is the key to almost every organization's success. Data is the lifeblood of business -- the information one uses to be competitive and the information that spells success or failure in the marketplace. Data is so important that an entirely new security focus has arisen -- Computer Information Security. In an era in which we must choose which issues for focus, the issue

Computer System Administrator Systems Administrator
Words: 1661 Length: 4 Document Type: Literature Review

Retrieved from http://books.google.co.ke/books?id=3Tla6d153uwC&printsec=frontcover&dq=Encyclopedia+of+computer+science+and+technology&hl=en&sa=X&ei=dZH_UNjcIcHQhAeRg4C4Bw&ved=0CCwQ6AEwAA Kizza, J.M. (2005). Computer Network Security. New York, NY: Springer. Retrieved from http://books.google.co.ke/books?id=HsawoKBLZOwC&printsec=frontcover&dq=Computer+Network+Security&hl=en&sa=X&ei=uZH_UJn-NMbNhAeWroDYCA&ved=0CCwQ6AEwAA#v=onepage&q=Computer%20Network%20Security&f=false Musumeci, G.-P. D., & Loukides, M. (2002). System performance tuning: [help for Unix system administrators]. Beijing [u.a.: O'Reilly. Retrieved from http://books.google.co.ke/books?id=L4oyNrsFBbsC&printsec=frontcover&dq=System+performance+tuning&hl=en&sa=X&ei=C5L_UKjmNonMhAen8ICoBw&ved=0CDIQ6AEwAA Adelstein, T., & Lubanovic, B. (2007). Linux system administration. Sebastopol, Calif: O'Reilly. Retrieved from http://books.google.co.ke/books?id=- jYe2k1p5tIC&printsec=frontcover&dq=Advanced+system+administration&hl=en&sa=X &ei=fpP_UM6EN8HMhAff9YC4DQ&ved=0CD0Q6AEwBA#v=onepage&q=Advanced %20system%20administration&f=false Verma, D.C. (2009). Principles of computer systems and network management. Dordrecht: Springer. Retrieved http://books.google.co.ke/books?id=dUiNGYCiWg0C&printsec=frontcover&dq=Principles+of+computer+systems+and+network+management&hl=en&sa=X&ei=i5T_UIG3IMaBhQfF2YD4Bg&ved=0CDQQ6AEwAA#v=onepage&q=Principles%20of%20computer%20systems%20and%20network%20management&f=false Whyte, E. (2004, Feb 09). Be a system

Information Technology a Home Network
Words: 1182 Length: 4 Document Type: Essay

Processing examples are conversion of encoded or typed words to printable format or running of computer programs such as the Statistical Package for Social Sciences (SPSS). Lastly, controlling ensures that all other four operations of the computer are efficiently working together, while at the same time, ensuring also that each operation does not interfere with the other operations. Examples of control measures in the computer are warnings or prompts

Information Technology and Its Uses
Words: 5994 Length: 22 Document Type: Thesis

Nanotechnology attempted to show the potential of this new technology and included the wide range of fields that are connected to the concept of the nanometer scale. These include machining, imaging, metrology or measurement, micromachines, instrumentation and machine tools, scanning probe microscopy, fabrication of components, nanoelectronics, molecular engineering, among others. (Journal Review: Nanotechnology) Another important step in the development of this technology in both a practical and theoretical sense was

Marketing and Information Systems
Words: 2196 Length: 8 Document Type: Term Paper

Role of Information Systems in Marketing The objective of this study is to examine the role of information systems in marketing in terms of the information that is necessary for decision making. Additionally this work will examine the role of IS for this function within the organization and the benefits of IS for the functional users at the operational level, the use of data at all levels of the organization and

Explosive Impacts of Computer and Information Technology
Words: 3234 Length: 10 Document Type: Essay

Explosive impacts of computer and information technology on business and individuals have generated a need to design and develop new computer and software system to incorporate a rapid growing range of computer applications. Software engineers apply the software engineering principles and techniques to design, evaluate, test and implement software systems to enable computer to perform different applications. Software engineers use systematic and quantified approach to design, evaluate, implement software and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now