Wireless Technology Is Difficult to Connect to Essay

Excerpt from Essay :

Wireless Technology Is Difficult to Connect

To Other Parts of Information Systems

There are many challenging aspects to even the most fundamental system and process integration tasks within organizations that have standardized on a common platform. When platforms vary significantly by protocol and by technologies, as TCP/IP-based networks often do across any organization, integration becomes even more difficult. When the strategies and processes that organizations rely on to attain objectives are included in the analysis, the challenges become even greater. Because of the multiplicity of these factors, it is very difficult to connect the many forms of wireless technologies into legacy, third-party and enterprise-wide systems within an organization.

Lack of Integration at the Protocol Structural Level

At the most fundamental level of integration wireless networks often support a varying standard to the Carrier Sense Multiple Access, Collision Detection (CSMA/CD) based protocols that full category-5 cabled networks do, in addition to having more options for optimizing network performance. Wireless protocols for example support both asynchronous and synchronous communication and have for decades successfully compared to many legacy information systems platforms from proprietary vendors including IBM and their Token Ring standard and others (Adams, Dimitriou, 2008). Wireless networks have quickly moved forward with their own standards, driven by the acceleration of the IEEE 802.11 baseline that define the technologies, parameters and options used acorss the frequency spectrum of wireless networks. These standards are also being driven by the accelerating nature of new product development cycles and the reliance on often conflicting, yet continually improving, Wi-Fi standards. While speed and customization of IEEE 802.11 standards continues ironically these networks have less versatility than a fully-wired counterpart using standard TCP/IP-based command structures and configuration (Macedo, dos Santos, Correia, Nogueira, Pujolle, 2010). Wi-Fi is heavily hyped today as it is seen as a critical marketing message for smartphones, tablet PCs, laptops and many other devices. In reality, the reliance on Wi-Fi standards has actually slowed down the performance of entire enterprise networks and has also led to "dead zones" within companies where wireless networks cannot either be configured or used due to security concerns (Adams, Dimitriou, 2008). The IEEE 802.11 standard, the lack of clarity on integration of wireless networks into legacy networking environments, the security and privacy concerns of using secured wireless networks, and the lack of adequate training in many organizations all lead to wireless networks failing to be successfully integrated into organizations. In addition to these structural issues, there are also performance and security issues that complicate the integration of wireless networks into companies as well.

The Challenges of Wireless Network Performance

In addition to the structural aspects of wireless networks not integrating well into legacy networks that are based on CSMA/CD and CSMA/CD (Token Ring) standards, there is also the lack of protocol consistency within and between wireless standards, which significantly reduces integration flexibility and performance as well. The conflicting protocol standards of wireless networks make full compatibility, connectivity and integration extremely difficult at the packet level, much less unifying a complex business process using varying protocols (Alonistioti, Patouni, Gazis, 2006). Of all factors most responsible for slowing the integration of wireless systems, this is…

Sources Used in Document:


Adams, C., & Dimitriou, A.. (2008). A Two-Phase Authentication Protocol Using the Cell Phone as a Token. Journal of Information Privacy & Security, 4(2), 23-39.

Nancy Alonistioti, Eleni Patouni, Vangelis Gazis. (2006). Generic Architecture and Mechanisms for Protocol Reconfiguration. Mobile Networks and Applications, 11(6), 917-934.

Macedo, D., dos Santos, A., Correia, L., Nogueira, J., & Pujolle, G.. (2010). Transmission power and data rate aware routing on wireless networks. Computer Networks, 54(17), 2979.

Bruce Potter. (2007). Mobile security risks: ever evolving. Network Security, 2007(8), 19-20.

Cite This Essay:

"Wireless Technology Is Difficult To Connect To" (2011, March 03) Retrieved April 24, 2019, from

"Wireless Technology Is Difficult To Connect To" 03 March 2011. Web.24 April. 2019. <

"Wireless Technology Is Difficult To Connect To", 03 March 2011, Accessed.24 April. 2019,