Verified Document

Wireless Technology Is Difficult To Connect To Essay

Wireless Technology Is Difficult to Connect To Other Parts of Information Systems

There are many challenging aspects to even the most fundamental system and process integration tasks within organizations that have standardized on a common platform. When platforms vary significantly by protocol and by technologies, as TCP/IP-based networks often do across any organization, integration becomes even more difficult. When the strategies and processes that organizations rely on to attain objectives are included in the analysis, the challenges become even greater. Because of the multiplicity of these factors, it is very difficult to connect the many forms of wireless technologies into legacy, third-party and enterprise-wide systems within an organization.

Lack of Integration at the Protocol Structural Level

At the most fundamental level of integration wireless networks often support a varying standard to the Carrier Sense Multiple Access, Collision Detection (CSMA/CD) based protocols that full category-5 cabled networks do, in addition to having more options for optimizing network performance. Wireless protocols for example support both asynchronous and synchronous communication and have for decades successfully compared to many legacy information systems platforms from proprietary vendors including IBM and their Token Ring standard and others (Adams, Dimitriou, 2008). Wireless networks have quickly moved forward with their own standards, driven by the acceleration of the IEEE 802.11 baseline that define the technologies, parameters and options used acorss the frequency spectrum of wireless networks. These standards are also being driven by the accelerating nature of new product development cycles and the reliance on often conflicting, yet continually improving, Wi-Fi standards. While speed and customization of IEEE 802.11 standards continues...

Wi-Fi is heavily hyped today as it is seen as a critical marketing message for smartphones, tablet PCs, laptops and many other devices. In reality, the reliance on Wi-Fi standards has actually slowed down the performance of entire enterprise networks and has also led to "dead zones" within companies where wireless networks cannot either be configured or used due to security concerns (Adams, Dimitriou, 2008). The IEEE 802.11 standard, the lack of clarity on integration of wireless networks into legacy networking environments, the security and privacy concerns of using secured wireless networks, and the lack of adequate training in many organizations all lead to wireless networks failing to be successfully integrated into organizations. In addition to these structural issues, there are also performance and security issues that complicate the integration of wireless networks into companies as well.
The Challenges of Wireless Network Performance

In addition to the structural aspects of wireless networks not integrating well into legacy networks that are based on CSMA/CD and CSMA/CD (Token Ring) standards, there is also the lack of protocol consistency within and between wireless standards, which significantly reduces integration flexibility and performance as well. The conflicting protocol standards of wireless networks make full compatibility, connectivity and integration extremely difficult at the packet level, much less unifying a complex business process using varying protocols (Alonistioti, Patouni, Gazis, 2006). Of all factors most responsible for slowing the integration of wireless systems, this is the most common and most detrimental.…

Sources used in this document:
References

Adams, C., & Dimitriou, A.. (2008). A Two-Phase Authentication Protocol Using the Cell Phone as a Token. Journal of Information Privacy & Security, 4(2), 23-39.

Nancy Alonistioti, Eleni Patouni, Vangelis Gazis. (2006). Generic Architecture and Mechanisms for Protocol Reconfiguration. Mobile Networks and Applications, 11(6), 917-934.

Macedo, D., dos Santos, A., Correia, L., Nogueira, J., & Pujolle, G.. (2010). Transmission power and data rate aware routing on wireless networks. Computer Networks, 54(17), 2979.

Bruce Potter. (2007). Mobile security risks: ever evolving. Network Security, 2007(8), 19-20.
Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Wireless LAN and Wireless Man
Words: 3663 Length: 10 Document Type: Term Paper

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Wireless Networking
Words: 12201 Length: 44 Document Type: Term Paper

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Wireless Options for the Production Building
Words: 945 Length: 2 Document Type: Term Paper

Networking Wireless Options for the Production Building Lake View Chemicals has made the decision to implement a new wireless networking option for their production building. The requirement to move between different locations within their building to utilize more versatile portable computers as opposed to being mired at fixed workstations is the main objective. As an IT consultant for Aspen IT Services, I feel that as Lake View Chemicals explores the use of

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Free Wireless Networks
Words: 5062 Length: 20 Document Type: Term Paper

Free Wireless Networks Since the construction of the information Superhighway, its' use to distribute information has become phenomenal. Information gathering and dissemination is the most valuable asset for a business to succeed. Demands for more and more efficient means of connecting to the Internet have driven exponential technological advances. So much so that the craze to connect has gone wireless and with this technology an entirely new set of issues, concerns

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now