Studyspark Study Document

Evolution of Wireless Computer Technology Term Paper

Pages:5 (1341 words)

Sources:5

Subject:Technology

Topic:Computer Technology

Document Type:Term Paper

Document:#16065178


Fixed network stations (i.e. desktop computers) connect through a USB port adapter, while laptops generally employ a wireless PCMCIA card at a nominal cost. In the last few years, these pieces of equipment have been replaced by many laptop manufacturers with internal wireless capabilities included as standard equipment in higher-end laptops.

Modern Wireless Networking Options and Recommendations:

Modern wireless computer technology transmits data at 2.4GHzor 5 GHz, at 54mb/sec to 108mb/sec, which enables much larger volumes of data than the frequencies employed by cell phones (Wilson, 2007). Still, wireless data transfer rates are limited in comparison to the fastest hard-wired connections, which can now transmit data as fast as 1000mb/sec. Even within these limitations, wireless computing technology is now a viable option for most business applications, with certain specific exceptions.

Industries that routinely handle extremely high volumes of data may overload wireless networks, particularly where many remote computers share the network. Other industries require the highest level of security, beyond ordinary encryption. Wireless networks can now be made relatively secure from external intrusions, to the extent that all but the most sensitive data may be safely transmitted. However, because wireless connections lack the physical barrier of hard wires, they cannot hope to match the highest security levels achievable with hard-wired networks, which cannot be infiltrated passively by intercepting radio waves. In addition to higher security than achievable through wireless connections, T-1 lines allow hundreds of different users to share the network without slowing down transmission rates, except where users must download extremely large files, such as MP3s (Franklin, 2007)

For all but the most sensitive data, Linksys Business Series WAP4400N Pre-

802.11n Wireless Access Point is a suitable unit, making use of one of the very latest

IEEE frequency assignments. Likewise, the Apple Airport Extreme Base MA073LL/a employs 802.11a, 802.11b, and 802.11g, the other recently designated wireless frequency (Wilson, 2007). Both pieces of equipment are affordable, at approximately $100-$155, and approximately $120 per unit, respectively.

Probably one of the most meaningful changes in the latest generations of wireless networking equipment is that it is now within the capability of most moderately proficient computer users to install and configure without expert assistance. Instead of the cumbersome software of the earliest available versions, the wireless networking equipment available today all feature their own built in web browsers with straight forward Internet connection and configuration guides that make setting up wireless networks as simple as other program installation procedures familiar to most computer users (Franklin, 2007).

Where wireless technology still falls short of the comparable capabilities of hard- wired networks concerns the relationship between published performance ratings and actual limitations in use. Manufacturers' ratings pertain to ideal conditions without taking into account practical limitations of the physical surroundings in the environments where networks must operate. Physical barriers such as walls and other office equipment that emit electromagnetic waves may decrease the published maximum transmission distance of 300 feet to 150 feet or less, depending on the environment. For this reason, a survey of signal strength capabilities on location is a necessary step before selecting wireless networking over the best available hard-wired alternatives.

Prior to the introduction of the latest equipment transmitting on the 802.11a, 802.11g, and 802.11n frequencies, many business environments required the use of a signal repeater to enable 802.11b signals to reach their expected range. Today, wireless networking offers an economical alternative to hard-wired networks without compromising specifications of data transfer speed and information security, except for use with the most demanding computer applications, or where the network must accommodate hundreds of simultaneous users. The only other advantage to hard-wired networking pertains to safeguarding the most highly sensitive data from unauthorized external interception.

References

Brain, M., T. Wilson (2007) How WiFi Works. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Briere, D. Wireless Networking for Dummies (2003) Wiley

Franklin, C. (2007) How Cable Modems Work. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Franklin, C. (2007) How DSL Works. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Franklin, C (2007) How does a T1…


Sample Source(s) Used

References

Brain, M., T. Wilson (2007) How WiFi Works. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Briere, D. Wireless Networking for Dummies (2003) Wiley

Franklin, C. (2007) How Cable Modems Work. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Franklin, C. (2007) How DSL Works. Accessed September 27, 2007, at www.computers.howstuffworks/questions.htm

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Computer Technology and Operations Management

Pages: 9 (2574 words) Sources: 1+ Subject: Business - Management Document: #40348424

, 2005). Even for businesses that are not regulated, learning management systems can be highly beneficial for the tracking and management of employees (Martin et al., 2005). There are several functions that learning management systems facilitate within businesses these include: the documentation of training requirements for all employees, including requirements that are motivated by local and global policies and standards; the reduction of repetitiveness in the methods used to track

Studyspark Study Document

Pros and Cons of Computer Technology Advancement

Pages: 5 (1469 words) Sources: 1 Subject: Education - Computers Document: #5941446

Computer Technology Advancement The pace at which computer technology has been increasing in speed and efficiency is a modern marvel of science. There is no denying that the world has been completely shaken by the rapid spread of information, and the increased access to communication methods. The humble beginnings of computers after World War II was an evolution of needs by the United States government. The Space program contributed greatly to

Studyspark Study Document

Wireless LAN and Wireless Man

Pages: 10 (3663 words) Sources: 1+ Subject: Education - Computers Document: #17121704

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Studyspark Study Document

Computer Science: Networking the Objective

Pages: 8 (2238 words) Sources: 1+ Subject: Education - Computers Document: #25988798

(Cisco, 2009) It is reported by Nortel that it has been indicated by 86% of service providers that there is a high demand for Ethernet services today. The result is that carriers are seeking to fulfill the demand through "upgrading their metro networks to deliver cost-effective Ethernet-based services to their customers." (2009) MPLS is stated to have been invented for the express purpose of "...of solving the problem of bridging

Studyspark Study Document

Wireless Transport Layer Security and

Pages: 5 (1919 words) Sources: 1+ Subject: Education - Computers Document: #80809754

The wireless application models closely follow the internet model. "WAP specifies two essential elements of wireless communication: an end-to-end application protocol and an application environment based on a browser. The application protocol is a layered communication protocol that is embedded in each WAP user agent. The network side includes a server component implementing the other end of the protocol that is capable of communicating with any WAP user agents.

Studyspark Study Document

Wireless Electricity Wireless Transmission of

Pages: 10 (3032 words) Sources: 10 Subject: Energy Document: #49477921

The second stage of the process will involve developing the stratospheric platforms that can be used in routing electric power from the power plants that will be established to the source areas scattered all over the world. The last stage will involve the full utilization of the space power technology where clean and efficient space power will effectively be used to light and power the world. While many of these

Join thousands of other students and

"spark your studies".