Term Paper Undergraduate 1,341 words Human Written

Evolution of Wireless Computer Technology

Last reviewed: ~7 min read Technology › Computer Technology
80% visible
Read full paper →
Paper Overview

Evolution of Wireless Computer Technology Within the last fifty years, computer technology has evolved from room-sized computers whose total computing power was less than that of a modern programmable calculator or wrist watch to powerful processors capable of transmitting data and accessing the Internet wirelessly. Computer technology began to trickle down...

Full Paper Example 1,341 words · 80% shown · Sign up to read all

Evolution of Wireless Computer Technology Within the last fifty years, computer technology has evolved from room-sized computers whose total computing power was less than that of a modern programmable calculator or wrist watch to powerful processors capable of transmitting data and accessing the Internet wirelessly. Computer technology began to trickle down from the cutting-edge systems used by NASA and the military to professional business use in the 1980s, and within a decade, computers were ubiquitous to virtually every element of modern business and business administration.

By the time the World Wide Web first came online in 1995, business computer systems and networks had already begun the transition from cumbersome software that made it difficult if not impossible to link multiple data terminals to a single network to a seamless connection between multiple computer terminals, and between computer terminals and other peripherals, like printers and scanners. Initially, Internet connections relied on ordinary telephone lines through dial-up modems and hard-wired routers with very limited capacity by today's standards.

Large enterprises used T-1 lines at the time, which offered tremendously increased connection speed compared to dial-up modems. However, the technology was impractically expensive for many businesses, with monthly fees often exceeding $1,000 per month. Cable modems began to replace dial-up modems and hard-wired routers on a more widespread basis in 1999, which offered business computing the advantages of tremendously increased speed, (by approximately a factor of five), as well as the interconnection of multiple computers within a single network sharing a single high- speed Internet connection.

The first generation of wireless computer connection hardware was introduced by 3 com, but the technology was still too expensive for many business and individuals contemplating the upgrade from hard-wired connections to wireless networking (Briere, 2003). At that time, the price of a router was approximately $1,000, with Ethernet cards required for each remote computer terminal adding approximately another $200, each. The hardware of the era was very difficult to configure with its corresponding software, and far beyond the technical capabilities of non-expert installation and maintenance.

As a result of the high price and complicated, temperamental nature of establishing the first generation of wireless networking equipment, most users opted for digital subscriber lines (DSL), because they boosted speeds considerably, over the fastest data transfer rates then achievable through dial-up modems over telephone lines (Franklin, 2007). DSL lines offered the advantage of a continuous Internet connection that shared the telephone line without interfering with regular telephone use over the same line simultaneously.

Only in the last decade, have computer hardware and software both evolved and become standardized sufficiently to allow for the development of seamless wireless communications, including full-scale wireless networking, within the budget of most business and individual private computer user. Computing Goes Wireless: When wireless technology first debuted, the IEEE assigned several specific radio wave frequencies for wireless computing, with different specifications, standards, and capabilities.

The primary frequencies used by business networks were designated 802.11b and 802.11g, with a third frequency, 802.11a suitable for personal computing, because of its greater compatibility with personal computing hardware of the time. Transmission by the three different systems varied in reliability and signal strength, depending on structural interference by walls and other limitations.

In many cases, business were better served by electing the less sophisticated and slower connections of the 802.11a systems, because it was somewhat less impervious to external interference from structures and other electrical systems, such as fluorescent lighting within close proximity to the network hardware (Briere, 2003). In some cases, wireless technology was insufficiently developed to accommodate some types of business, because the advanced encryption necessary to safeguard sensitive and proprietary information was still not supported by the 802.11 series-based technology at all.

In some cases, networking through electrical wiring offered some of the advantages of eliminating traditional hard wires without compromising the security of information to electronic interception (Briere, 2003). Wireless networks replace the traditional hard-wired router connecting individual terminals to a single high-speed dial-up modem, DSL line, or cable modem with a wireless router to perform the same function. Fixed network stations (i.e. desktop computers) connect through a USB port adapter, while laptops generally employ a wireless PCMCIA card at a nominal cost.

In the last few years, these pieces of equipment have been replaced by many laptop manufacturers with internal wireless capabilities included as standard equipment in higher-end laptops. Modern Wireless Networking Options and Recommendations: Modern wireless computer technology transmits data at 2.4GHzor 5 GHz, at 54mb/sec to 108mb/sec, which enables much larger volumes of data than the frequencies employed by cell phones (Wilson, 2007). Still, wireless data transfer rates are limited in comparison to the fastest hard-wired connections, which can now transmit data as fast as 1000mb/sec.

Even within these limitations, wireless computing technology is now a viable option for most business applications, with certain specific exceptions. Industries that routinely handle extremely high volumes of data may overload wireless networks, particularly where many remote computers share the network. Other industries require the highest level of security, beyond ordinary encryption. Wireless networks can now be made relatively secure from external intrusions, to the extent that all but the most sensitive data may be safely transmitted.

However, because wireless connections lack the physical barrier of hard wires, they cannot hope to match the highest security levels achievable with hard-wired networks, which cannot be infiltrated passively by intercepting radio waves.

In addition to higher security than achievable through wireless connections, T-1 lines allow hundreds of different users to share the network without slowing down transmission rates, except where users must download extremely large files, such as MP3s (Franklin, 2007) For all but the most sensitive data, Linksys Business Series WAP4400N Pre- 802.11n Wireless Access Point is a suitable unit, making use of one of the very latest IEEE frequency assignments.

Likewise, the Apple Airport Extreme Base MA073LL/a employs 802.11a, 802.11b, and 802.11g, the other recently designated wireless frequency (Wilson, 2007). Both pieces of equipment are affordable, at approximately $100-$155, and approximately $120 per unit, respectively. Probably one of the most meaningful changes in the latest generations of wireless networking equipment is that it is now within the capability of most moderately proficient computer users to install and configure without expert assistance.

Instead of the cumbersome software of the earliest available versions, the wireless networking equipment available today all feature their own built in web browsers with straight forward Internet connection and configuration guides that make setting up wireless.

269 words remaining — Conclusions

You're 80% through this paper

The remaining sections cover Conclusions. Subscribe for $1 to unlock the full paper, plus 130,000+ paper examples and the PaperDue AI writing assistant — all included.

$1 full access trial
130,000+ paper examples AI writing assistant included Citation generator Cancel anytime
Sources Used in This Paper
source cited in this paper
6 sources cited in this paper
Sign up to view the full reference list — includes live links and archived copies where available.
Cite This Paper
"Evolution Of Wireless Computer Technology" (2007, September 29) Retrieved April 22, 2026, from
https://www.paperdue.com/essay/evolution-of-wireless-computer-technology-35485

Always verify citation format against your institution's current style guide.

80% of this paper shown 269 words remaining