Wireless Networking Is Relatively Beneficial Term Paper
- Length: 7 pages
- Sources: 3
- Subject: Education - Computers
- Type: Term Paper
- Paper: #96206079
Excerpt from Term Paper :
(Gutierrez, Jose a; Callaway, 7)
Another benefit of WSN is the minimum damage or repair. A wiring may be lost or disconnected or might break due to various reasons. This is called last meter connectivity problem. Such problems are reduced by WSN. In a WAN, it is usually called the last mile connectivity problem. Finally, WSN enables collection of recurring information from a manufacturing environment to upgrade the quality of work. Deployment of cabled sensors in a manufacturing environment will lead to various barriers and would include huge costs. WSN is an adaptable method of connecting sensors. WSN registers various matters in an environment like security details, verification, radio frequency broadcast, fixing of an antenna, etc. A movable WSN has an edge over a fixed one, though the movement of WSN equipment does not arise. But this is helpful in the case of fixing a fast track network. Cabled and wireless networks work hand in hand to provide optimum solution in various stages of a network. Wireless networking is like a value added product of wired networking. (Gutierrez, Jose a; Callaway, 8)
Wireless networking has become so popular that a wireless LAN can be installed by anyone without incurring much cost. The devices that support wireless networking is becoming cheap day by day. The increase in the number of users of wireless networking also increases the number of hackers in the vicinity of a house or office. Thus wireless network should be protected using password at access points and routers. This requires the user to authenticate using a username and password to access the network and make changes in the default settings. Security concerns arise when a network uses the name of the manufacturer or the common password provided by the manufacturer. On purchasing a wireless network product, the default password should be replaced by a new password which cannot be guessed by any known person. Since it is a unique or rarely used word, it is safe to keep the password in writing for future reference. If the password is forgotten the only method to use the access point or router is to operate the system with default setting which will delete all the changes made to the wireless network. (Securing your Wireless Network)
The name or Service Set Identifier of the wireless network should not be displayed frequently. This increases the visibility of network details to other users in the area covered by wireless network. The identity of a network can be preserved by switching off the SSID, so that anyone with a wireless network cannot view the same. But the use of advanced hacking system like WLAN sniffers can reveal the identity of the wireless LAN. One of the disadvantages of Wired Equivalency Privacy or WEP in an 802.11 standard is the easy access provided to deliberate hackers. Hence a good method to secure wireless network is by using a WPA -- Wi-Fi Protected Access. WPA is embedded in most of the latest operating systems, hardware and windows XP. An intricate protection system is offered in the latest version of WPA2 which can be used by accessing to a XP patch from the Internet. Security concerns other than in personal computers however can be solved only by enabling WEP in equipments like personal digital assistance, media players and DVR. A better security is assured if the password is changed frequently; say once in a week or so. Security level of a WLAN can be further increased by decreasing the broadcasting power of the network. Access points and routers can be configured to limit the area covered by the radio signals. The accessibility of WLAN should be turned off in a router when not in use to avoid access by unidentified users from remote locations. (Securing your Wireless Network)
The benefits of wireless networking are high throughput of data measured at more than 20 Mbps. Comparatively cheaper to give additional gain to equipments, assured bandwidth to give high quality service, instant connection that is advantageous in terms of accessing from any location and movement of the user from place to place. Internet connection can be availed easily without undergoing a complex procedure for connectivity. The connection of the user directly to the Internet eliminates the need for a moderator. High level of privacy ensures confidentiality of information exchanged over the network. Though it is argued that 802.11 standards transmit information at a speed of 54 Mbps in favorable circumstances, the practical throughput provided by 802.11a and 802.11g is lower than 31 Mbps and 30 Mbps respectively. The throughput of 802.11g further reduced in the presence of 802.11b installations in a wireless local area network -- WLAN. 802.11 are mostly deployed in a set up where professional assistance is available to solve the intricacy of the wireless network. IEEE standard 802.11 assists instant installation of the network however, it is a complex method to install and it is a hindrance in terms of conserving power. This does not mean that the standard is a bad solution. This standard facilitates speed contact to the network. The portability of the network and consistent contact with the wired network in a setting assists users for unlimited access to data. (Gilb, 5)
The drawback of Radio Frequency method of networking is its short distance coverage and more energy requirements. Since the equipment totally depends on batteries, it is an expensive application and does not adhere to the basic idea of cost effectiveness and easy installation. Unlike recharging facilities for a cell phone or personal digital assistance, RF equipments depend on power. Restricted use of power by RF will result in very short distance coverage of Wireless Sensor Network's. Hence power cycling and suitable networking is the answer for such a requirement to enable proper function of WSN's embedded with RF transceivers. (Gutierrez, Jose a; Callaway, 9) Wireless services are being fixed to all suitable equipments with new mechanisms to exchange information through wireless networks. These services enable equipments and users to communicate during any point of time in any location. This is in line with the inventions and services a person enjoys while using a cell phone. Wireless connectivity is a necessity for the omnipresent world of rapid growth. (Vickery, 235)
Consulted Works (Not used in the paper)
Brodsky, Ira. Wireless Computing: A Manager's Guide to Wireless Networking. John Wiley and Sons. 1997.
Rackley, Steve. Wireless Networking Technology: From Principles to Successful Implementation. Elseiver. 2007.
Cardei, Mihaela; Cardei, Ionut; Du, Dingzhu. Resource Management in Wireless Networking. Springer, 2005.
Eady, Fred. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded... Newnes. 2005.
Ouellet, Eric; Padjen, Robert; Pfund, Arthur. Building a Cisco Wireless Lan. Syngress, 2004.
Barber, Brian; Cross, Michael; Craft, Melissa. MCSE Designing a Windows Server 2003 Active
Directory and Network... Syngress. 2003.
Cohen, Eli. ed. Teaching Mobile Communication in an E-Learning Environment, in Information and Beyond: Part I. Issues in Informing Science and Information Technology. 2007.
Gilb, James P.K. Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard. IEEE Standards
Gutierrez, Jose a; Callaway, Edgar H. Low-Rate Wireless Personal Area Networks: Enabling
Wireless Sensors with... IEEE Standards Association. 2004.
N.A. Securing your Wireless Network. Retrieved 8 March, 2008 at http://www.practicallynetworked.com/support/wireless_secure.htm
N.A. 29.3 Wireless Networking. FreeBSD Handbook. Retrieved 8 March, 2008 at http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/network-wireless.html
Vickery, Graham. OECD Information Technology Outlook: ICTs and the Information…