Verified Document

Wireless Networking Is Relatively Beneficial Term Paper

(Gutierrez, Jose a; Callaway, 7) Another benefit of WSN is the minimum damage or repair. A wiring may be lost or disconnected or might break due to various reasons. This is called last meter connectivity problem. Such problems are reduced by WSN. In a WAN, it is usually called the last mile connectivity problem. Finally, WSN enables collection of recurring information from a manufacturing environment to upgrade the quality of work. Deployment of cabled sensors in a manufacturing environment will lead to various barriers and would include huge costs. WSN is an adaptable method of connecting sensors. WSN registers various matters in an environment like security details, verification, radio frequency broadcast, fixing of an antenna, etc. A movable WSN has an edge over a fixed one, though the movement of WSN equipment does not arise. But this is helpful in the case of fixing a fast track network. Cabled and wireless networks work hand in hand to provide optimum solution in various stages of a network. Wireless networking is like a value added product of wired networking. (Gutierrez, Jose a; Callaway, 8)

Wireless networking has become so popular that a wireless LAN can be installed by anyone without incurring much cost. The devices that support wireless networking is becoming cheap day by day. The increase in the number of users of wireless networking also increases the number of hackers in the vicinity of a house or office. Thus wireless network should be protected using password at access points and routers. This requires the user to authenticate using a username and password to access the network and make changes in the default settings. Security concerns arise when a network uses the name of the manufacturer or the common password provided by the manufacturer. On purchasing a wireless network product, the default password should be replaced by a new password which cannot be guessed by any known person. Since it is a unique or rarely used word, it is safe to keep the password in writing for future reference. If the password is forgotten the only method to use the access point or router is to operate the system with default setting which will delete all the changes made to the wireless network. (Securing your Wireless Network)

The name or Service Set Identifier of the wireless network should not be displayed frequently. This increases the visibility of network details to other users in the area covered by wireless network. The identity of a network can be preserved by switching off the SSID, so that anyone with a wireless network cannot view the same. But the use of advanced hacking system like WLAN sniffers can reveal the identity of the wireless LAN. One of the disadvantages of Wired Equivalency Privacy or WEP in an 802.11 standard is the easy access provided to deliberate hackers. Hence a good method to secure wireless network is by using a WPA -- Wi-Fi Protected Access. WPA is embedded in most of the latest operating systems, hardware and windows XP. An intricate protection system is offered in the latest version of WPA2 which can be used by accessing to a XP patch from the Internet. Security concerns other than in personal computers however can be solved only by enabling WEP in equipments like personal digital assistance, media players and DVR. A better security is assured if the password is changed frequently; say once in a week or so. Security level of a WLAN can be further increased by decreasing the broadcasting power of the network. Access points and routers can be configured to limit the area covered by the radio signals. The accessibility of WLAN should be turned off in a router when not in use to avoid access by unidentified users from remote locations. (Securing your Wireless Network)

The benefits of wireless networking are high throughput of data measured at more than 20 Mbps. Comparatively cheaper to give additional gain to equipments, assured bandwidth to give high quality service, instant connection that is advantageous in terms of accessing from any location and movement of the user from place to place. Internet connection can be availed easily without...

Parts of this document are hidden

View Full Document
svg-one

The connection of the user directly to the Internet eliminates the need for a moderator. High level of privacy ensures confidentiality of information exchanged over the network. Though it is argued that 802.11 standards transmit information at a speed of 54 Mbps in favorable circumstances, the practical throughput provided by 802.11a and 802.11g is lower than 31 Mbps and 30 Mbps respectively. The throughput of 802.11g further reduced in the presence of 802.11b installations in a wireless local area network -- WLAN. 802.11 are mostly deployed in a set up where professional assistance is available to solve the intricacy of the wireless network. IEEE standard 802.11 assists instant installation of the network however, it is a complex method to install and it is a hindrance in terms of conserving power. This does not mean that the standard is a bad solution. This standard facilitates speed contact to the network. The portability of the network and consistent contact with the wired network in a setting assists users for unlimited access to data. (Gilb, 5)
The drawback of Radio Frequency method of networking is its short distance coverage and more energy requirements. Since the equipment totally depends on batteries, it is an expensive application and does not adhere to the basic idea of cost effectiveness and easy installation. Unlike recharging facilities for a cell phone or personal digital assistance, RF equipments depend on power. Restricted use of power by RF will result in very short distance coverage of Wireless Sensor Network's. Hence power cycling and suitable networking is the answer for such a requirement to enable proper function of WSN's embedded with RF transceivers. (Gutierrez, Jose a; Callaway, 9) Wireless services are being fixed to all suitable equipments with new mechanisms to exchange information through wireless networks. These services enable equipments and users to communicate during any point of time in any location. This is in line with the inventions and services a person enjoys while using a cell phone. Wireless connectivity is a necessity for the omnipresent world of rapid growth. (Vickery, 235)

Consulted Works (Not used in the paper)

Brodsky, Ira. Wireless Computing: A Manager's Guide to Wireless Networking. John Wiley and Sons. 1997.

Rackley, Steve. Wireless Networking Technology: From Principles to Successful Implementation. Elseiver. 2007.

Cardei, Mihaela; Cardei, Ionut; Du, Dingzhu. Resource Management in Wireless Networking. Springer, 2005.

Eady, Fred. Implementing 802.11 with Microcontrollers: Wireless Networking for Embedded... Newnes. 2005.

Ouellet, Eric; Padjen, Robert; Pfund, Arthur. Building a Cisco Wireless Lan. Syngress, 2004.

References

Barber, Brian; Cross, Michael; Craft, Melissa. MCSE Designing a Windows Server 2003 Active

Directory and Network... Syngress. 2003.

Cohen, Eli. ed. Teaching Mobile Communication in an E-Learning Environment, in Information and Beyond: Part I. Issues in Informing Science and Information Technology. 2007.

Gilb, James P.K. Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard. IEEE Standards

Association. 2004.

Gutierrez, Jose a; Callaway, Edgar H. Low-Rate Wireless Personal Area Networks: Enabling

Wireless Sensors with... IEEE Standards Association. 2004.

http://books.google.com/books?id=4-XeYZfk2M8C&pg=PA5&dq=wireless+networking+%2B+benefits&as_brr=1&sig=HA9utpK62mDSdVf8wPu70pIPlPE#PPA5,M1"

N.A. Securing your Wireless Network. Retrieved 8 March, 2008 at http://www.practicallynetworked.com/support/wireless_secure.htm

N.A. 29.3 Wireless Networking. FreeBSD Handbook. Retrieved 8 March, 2008 at http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/network-wireless.html

Vickery, Graham. OECD Information Technology Outlook: ICTs and the Information Economy.

Organisation for Economic Co-Operation, Development Bookshop. 2002.

Sources used in this document:
References

Barber, Brian; Cross, Michael; Craft, Melissa. MCSE Designing a Windows Server 2003 Active

Directory and Network... Syngress. 2003.

Cohen, Eli. ed. Teaching Mobile Communication in an E-Learning Environment, in Information and Beyond: Part I. Issues in Informing Science and Information Technology. 2007.

Gilb, James P.K. Wireless Multimedia: A Guide to the IEEE 802.15.3 Standard. IEEE Standards
http://books.google.com/books?id=4-XeYZfk2M8C&pg=PA5&dq=wireless+networking+%2B+benefits&as_brr=1&sig=HA9utpK62mDSdVf8wPu70pIPlPE#PPA5,M1"
N.A. Securing your Wireless Network. Retrieved 8 March, 2008 at http://www.practicallynetworked.com/support/wireless_secure.htm
N.A. 29.3 Wireless Networking. FreeBSD Handbook. Retrieved 8 March, 2008 at http://www.freebsd.org/doc/en_US.ISO8859-1/books/handbook/network-wireless.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Wireless Technologies Background of the Organization Including
Words: 1279 Length: 4 Document Type: Essay

Wireless Technologies Background of the organization including its primary products and services, location, and history How each of the technologies is used Advantages of using each of the technology Ease of signal transmission Degree of security protection Current availability of technology Summary of the main points of the entire paper Wireless technology is nowadays used to solve business problems. In fact, business people use it for competitive advantage purposes over their competitors. HP solutions offer wireless technology that

Wireless LAN and Wireless Man
Words: 3663 Length: 10 Document Type: Term Paper

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Wireless Technology Is Difficult to Connect to
Words: 1049 Length: 4 Document Type: Essay

Wireless Technology Is Difficult to Connect To Other Parts of Information Systems There are many challenging aspects to even the most fundamental system and process integration tasks within organizations that have standardized on a common platform. When platforms vary significantly by protocol and by technologies, as TCP/IP-based networks often do across any organization, integration becomes even more difficult. When the strategies and processes that organizations rely on to attain objectives are included

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Wireless Internet History of Wireless
Words: 1872 Length: 4 Document Type: Term Paper

The value proposition intends that device, wireless network, and content and services are in a combination. This means that mobile Internet devices will not be able to define applications or that internet content and services cannot define devices. In place of that the design of devices, content, services and networks should have respect for the each others capabilities and the value of each need to be given due consideration.

Wireless Electricity Wireless Transmission of
Words: 3032 Length: 10 Document Type: Research Paper

The second stage of the process will involve developing the stratospheric platforms that can be used in routing electric power from the power plants that will be established to the source areas scattered all over the world. The last stage will involve the full utilization of the space power technology where clean and efficient space power will effectively be used to light and power the world. While many of these

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now