Wireless Networking Is Relatively Beneficial Term Paper

Length: 7 pages Sources: 3 Subject: Education - Computers Type: Term Paper Paper: #96206079 Related Topics: Wireless Technology, Wireless Network, Windows 7, Cisco Systems
Excerpt from Term Paper :

(Gutierrez, Jose a; Callaway, 7)

Another benefit of WSN is the minimum damage or repair. A wiring may be lost or disconnected or might break due to various reasons. This is called last meter connectivity problem. Such problems are reduced by WSN. In a WAN, it is usually called the last mile connectivity problem. Finally, WSN enables collection of recurring information from a manufacturing environment to upgrade the quality of work. Deployment of cabled sensors in a manufacturing environment will lead to various barriers and would include huge costs. WSN is an adaptable method of connecting sensors. WSN registers various matters in an environment like security details, verification, radio frequency broadcast, fixing of an antenna, etc. A movable WSN has an edge over a fixed one, though the movement of WSN equipment does not arise. But this is helpful in the case of fixing a fast track network. Cabled and wireless networks work hand in hand to provide optimum solution in various stages of a network. Wireless networking is like a value added product of wired networking. (Gutierrez, Jose a; Callaway, 8)

Wireless networking has become so popular that a wireless LAN can be installed by anyone without incurring much cost. The devices that support wireless networking is becoming cheap day by day. The increase in the number of users of wireless networking also increases the number of hackers in the vicinity of a house or office. Thus wireless network should be protected using password at access points and routers. This requires the user to authenticate using a username and password to access the network and make changes in the default settings. Security concerns arise when a network uses the name of the manufacturer or the common password provided by the manufacturer. On purchasing a wireless network product, the default password should be replaced by a new password which cannot be guessed by any known person. Since it is a unique or rarely used word, it is safe to keep the password in writing for future reference. If the password is forgotten the only method to use the access point or router is to operate the system with default setting which will delete all the changes made to the wireless network. (Securing your Wireless Network)

The name or Service Set Identifier of the wireless network should not be displayed frequently. This increases the visibility of network details to other users in the area covered by wireless network. The identity of a network can be preserved by switching off the SSID, so that anyone with a wireless network cannot view the same. But the use of advanced hacking system like WLAN sniffers can reveal the identity of the wireless LAN. One of the disadvantages of Wired Equivalency Privacy or WEP in an 802.11 standard is the easy access provided to deliberate hackers. Hence a good method to secure wireless network is by using a WPA -- Wi-Fi Protected Access. WPA is embedded in most of the latest operating systems, hardware and windows XP. An intricate protection system is offered in the latest version of WPA2 which can be used by accessing to a XP patch from the Internet. Security concerns other than in personal computers however can be solved only by enabling WEP in equipments like personal digital assistance, media players and DVR. A better security is assured if the password is changed frequently; say once in a week or so. Security level of a WLAN can be further increased by decreasing the broadcasting power of the network. Access points and routers can be configured to limit the area covered by the radio signals. The accessibility of WLAN should be turned off in a router when not in use to avoid access by unidentified users from remote locations. (Securing your Wireless Network)

The benefits of wireless networking are high throughput of data measured at more than 20 Mbps. Comparatively cheaper to give additional gain to equipments, assured bandwidth to...


Internet connection can be availed easily without undergoing a complex procedure for connectivity. The connection of the user directly to the Internet eliminates the need for a moderator. High level of privacy ensures confidentiality of information exchanged over the network. Though it is argued that 802.11 standards transmit information at a speed of 54 Mbps in favorable circumstances, the practical throughput provided by 802.11a and 802.11g is lower than 31 Mbps and 30 Mbps respectively. The throughput of 802.11g further reduced in the presence of 802.11b installations in a wireless local area network -- WLAN. 802.11 are mostly deployed in a set up where professional assistance is available to solve the intricacy of the wireless network. IEEE standard 802.11 assists instant installation of the network however, it is a complex method to install and it is a hindrance in terms of conserving power. This does not mean that the standard is a bad solution. This standard facilitates speed contact to the network. The portability of the network and consistent contact with the wired network in a setting assists users for unlimited access to data. (Gilb, 5)

The drawback of Radio Frequency method of networking is its short distance coverage and more energy requirements. Since the equipment totally depends on batteries, it is an expensive application and does not adhere to the basic idea of cost effectiveness and easy installation. Unlike recharging facilities for a cell phone or personal digital assistance, RF equipments depend on power. Restricted use of power by RF will result in very short distance coverage of Wireless Sensor Network's. Hence power cycling and suitable networking is the answer for such a requirement to enable proper function of WSN's embedded with RF transceivers. (Gutierrez, Jose a; Callaway, 9) Wireless services are being fixed to all suitable equipments with new mechanisms to exchange information through wireless networks. These services enable equipments and users to communicate during any point of time in any location. This is in line with the inventions and services a person enjoys while using a cell phone. Wireless connectivity is a necessity for the omnipresent world of rapid growth. (Vickery, 235)

Consulted Works (Not used in the paper)

Brodsky, Ira. Wireless Computing: A Manager's Guide to Wireless Networking. John Wiley and Sons. 1997.

Rackley, Steve. Wireless Networking Technology: From Principles to Successful Implementation. Elseiver. 2007.

Cardei, Mihaela; Cardei, Ionut; Du, Dingzhu. Resource Management in Wireless Networking. Springer, 2005.

Eady, Fred. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded... Newnes. 2005.

Ouellet, Eric; Padjen, Robert; Pfund, Arthur. Building a Cisco Wireless Lan. Syngress, 2004.


Barber, Brian; Cross, Michael; Craft, Melissa. MCSE Designing a Windows Server 2003 Active

Directory and Network... Syngress. 2003.

Cohen, Eli. ed. Teaching Mobile Communication in an E-Learning Environment, in Information and Beyond: Part I. Issues in Informing Science and Information Technology. 2007.

Gilb, James P.K. Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard. IEEE Standards

Association. 2004.

Gutierrez, Jose a; Callaway, Edgar H. Low-Rate Wireless Personal Area Networks: Enabling

Wireless Sensors with... IEEE Standards Association. 2004.


N.A. Securing your Wireless Network. Retrieved 8 March, 2008 at http://www.practicallynetworked.com/support/wireless_secure.htm

N.A. 29.3 Wireless Networking. FreeBSD Handbook. Retrieved 8 March, 2008 at http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/network-wireless.html

Vickery, Graham. OECD Information Technology Outlook: ICTs and the Information…

Sources Used in Documents:


Barber, Brian; Cross, Michael; Craft, Melissa. MCSE Designing a Windows Server 2003 Active

Directory and Network... Syngress. 2003.

Cohen, Eli. ed. Teaching Mobile Communication in an E-Learning Environment, in Information and Beyond: Part I. Issues in Informing Science and Information Technology. 2007.

Gilb, James P.K. Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard. IEEE Standards

Cite this Document:

"Wireless Networking Is Relatively Beneficial" (2008, March 12) Retrieved October 24, 2021, from

"Wireless Networking Is Relatively Beneficial" 12 March 2008. Web.24 October. 2021. <

"Wireless Networking Is Relatively Beneficial", 12 March 2008, Accessed.24 October. 2021,

Related Documents
Wireless Technologies or Internet Are Used to
Words: 616 Length: 2 Pages Topic: Education - Computers Paper #: 76296405

Wireless technologies or Internet are used to develop a network through transmission of radio-frequency signals between computers for information sharing. Since these technologies do not use wires/cables, the broadcast of information within the network is primarily based on radio signals. Wireless technologies have developed to become very popular across every facet of society because they have revolutionized communication. These technologies basically emanated and were developed in the computer networking technologies

Networking and Cellular Phone Service In India
Words: 1760 Length: 6 Pages Topic: Business Paper #: 54058486

Therefore, the suggestions forwarded would most definitely be different if the discussion had been about another country or another industry. But even so, there are some rules compulsory to be implemented, without which the organization will not retrieve the desired beneficial results. These general recommendations include: Clearly analyzing the features of the new market in order to get an idea of the product demand and the needs of the customers,

Principles of Incident Response and Disaster Recovery
Words: 2060 Length: 8 Pages Topic: Education - Computers Paper #: 52903638

Disaster Recovery Intrusion detection is the method of keeping track of the events taking place inside a computer or perhaps a network and then examining them to get indications of potential situations, that are transgressions or impending dangers of breach of IT security procedures, appropriate usage guidelines, or standardized security strategies. Intrusion prevention is the method of carrying out intrusion detection as well as trying to stop recognized potential situations.

Leadership Style and Characteristics Affect
Words: 5990 Length: 20 Pages Topic: Leadership Paper #: 5512954

Furthermore, there are a number of similarities and overlaps between such leadership theories that do not prevent their being characterized as transformational in nature. For example, "Most leaders behave in both transactional and transformational ways in different intensities and amounts; this is not an entirely either-or differentiation" (Miner, 2002 p. 743). One of the more interesting issues to emerge from the research is the need for transformational leaders to teach

Lte Long-Term Evolution
Words: 3505 Length: 10 Pages Topic: Business Paper #: 37918410

LTE (Long-Term Evolution) Long-Term Evolution (LTE) A Summary of LTE Implications for Stakeholders Application of Theories Structured Cabling Issues Technical Specifications Operations Plan Feasibility Study Features of LTE Past Technologies The Best Choice? Long-Term Evolution (LTE) A Summary of LTE Long-term evolution (LTE) is an emerging technology. It is a standard in wireless communication, and relates to the effective and efficient transfer of high-speed data for both data terminals and mobile phones (Sesia, Toufik, & Baker, 2011). Based on GSM/EDGE as well as UMTS/HSPA

Strategic Management the Case for Diversification Deltacom/Earthlink...
Words: 1611 Length: 5 Pages Topic: Business Paper #: 73633595

Strategic Management The Case for Diversification Deltacom/Earthlink is facing a challenging operating environment. As a regional player in an intensely-competitive market, we face an uncertain future. We acquired Deltacom in order to facilitate future growth, but a quick look at our financials indicates that our growth has flatlined and our profits declined to almost nothing last year (MSN Moneycentral, 2013). One of the issues is that there was considerable overlap between Earthlink