Wireless Networks Computer Software Is Still A Essay

PAGES
2
WORDS
573
Cite

Wireless Networks Computer Software Is Still a Major Barrier to Wireless Information Systems

Despite the exceptional growth of many forms of wireless networks and their many variations including metropolitan Wi-Fi and distance-based wireless networks used in broad geographic regions, software continues to be a major barrier to their adoption. The intent of this analysis is to illustrate why software has now become more of an impediment than catalyst of wireless network adoption and use.

Security

At its most fundamental level, wireless information systems today lack the level of security possible with more proven network topologies and configurations. The pervasive use of Secured Sockets layer (SSL) versus IPsec on wireless networks has become commonplace yet both still have major vulnerabilities in their structure (Titmus, 2006). To attain the highest level of security possible on large-scale wireless information systems a high degree of flexibility needs...

...

This is not acceptable as the application area that shows the greatest revenue potential is mobile-ecommerce (m-commerce) (Stewart, Spencer, Melby, 2006). The lack of scalable security models is a major impediment to the development of scalable m-commerce business models as a result. IPsec assumes a completely secured network, yet this type of network also cannot scale to a metropolitan level to support m-commerce over the long-term (Xirasagar, Mojtahed, 2010). The reliance on Virtual Private Network (VPN) approaches to corporate networking provide a secured tunnel for transfer of information yet this is only on a one-to-one configuration (Titmus, 2006). From this limited level of software security, the other areas of wireless information systems also become more of an impediment than a catalyst of growth.
Making Wireless Networks Relevant To Users

As the lack of security is seriously curtailing growth and leading to a slowed pace…

Sources Used in Documents:

References

Kangasharju, J., Lindholm, T., & Tarkoma, S.. (2007). XML messaging for mobile devices: From requirements to implementation. Computer Networks, 51(16), 4634.

Bahattin Ozen, Ozgur Kilic, Mehmet Altinel, & Asuman Dogac. (2004). Highly Personalized Information Delivery to Mobile Clients. Wireless Networks: Data Engineering for Mobile and Wireless Access (Guest, 10(6), 665-683.

Nelson Stewart, Jared Spencer, & Nathaniel Melby. (2006). Developing Trust in M-commerce: A Vendor and Certificate Authority Model. Journal of Information Privacy & Security, 2(2), 51-58.

Peter Titmus. (2006). Securing IP telephony systems - best practices. Network Security, 2006(9), 11.


Cite this Document:

"Wireless Networks Computer Software Is Still A" (2011, February 09) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/wireless-networks-computer-software-is-still-49669

"Wireless Networks Computer Software Is Still A" 09 February 2011. Web.19 April. 2024. <
https://www.paperdue.com/essay/wireless-networks-computer-software-is-still-49669>

"Wireless Networks Computer Software Is Still A", 09 February 2011, Accessed.19 April. 2024,
https://www.paperdue.com/essay/wireless-networks-computer-software-is-still-49669

Related Documents
Wireless Networking
PAGES 44 WORDS 12201

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Free Wireless Networks
PAGES 20 WORDS 5062

Free Wireless Networks Since the construction of the information Superhighway, its' use to distribute information has become phenomenal. Information gathering and dissemination is the most valuable asset for a business to succeed. Demands for more and more efficient means of connecting to the Internet have driven exponential technological advances. So much so that the craze to connect has gone wireless and with this technology an entirely new set of issues, concerns

Network Support Technologies Case Study Project Scope, Schedule, and Budget Type and Configuration of the Network Hardware Specifications Software Specifications User Policies and Legal Issues Life of Equipment Project Costs Providing an Online Radio Service Second Life Information is now growing at speeds never thought imaginable. Today's world of Information Technology (IT) has provided the dynamic platform in which exponentially growing information resources emerge. This complex arena of knowledge management provides tremendous advantages to modern society. It allows individuals greater

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are