Studyspark Study Document

Wireless Networks Computer Software Is Still a Essay

Pages:2 (573 words)

Sources:3

Subject:Technology

Topic:Wireless Network

Document Type:Essay

Document:#58876939


Wireless Networks

Computer Software Is Still a Major Barrier to Wireless Information Systems

Despite the exceptional growth of many forms of wireless networks and their many variations including metropolitan Wi-Fi and distance-based wireless networks used in broad geographic regions, software continues to be a major barrier to their adoption. The intent of this analysis is to illustrate why software has now become more of an impediment than catalyst of wireless network adoption and use.

Security

At its most fundamental level, wireless information systems today lack the level of security possible with more proven network topologies and configurations. The pervasive use of Secured Sockets layer (SSL) versus IPsec on wireless networks has become commonplace yet both still have major vulnerabilities in their structure (Titmus, 2006). To attain the highest level of security possible on large-scale wireless information systems a high degree of flexibility needs to be sacrificed (Titmus, 2006). This is not acceptable as the application area that shows the greatest revenue potential is mobile-ecommerce (m-commerce) (Stewart, Spencer, Melby, 2006). The lack of scalable security models is a major impediment to the development of scalable m-commerce business models as a result. IPsec assumes a completely secured network, yet this type of network also cannot scale to a metropolitan level to support m-commerce over the long-term (Xirasagar, Mojtahed, 2010). The reliance on Virtual Private Network (VPN) approaches to corporate networking provide a secured tunnel for transfer of information yet this is only on a one-to-one configuration (Titmus, 2006). From this limited level of software security, the other areas of wireless information systems also become more of an impediment than a catalyst of growth.

Making Wireless Networks Relevant To Users

As the lack of security is seriously curtailing growth…


Sample Source(s) Used

References

Kangasharju, J., Lindholm, T., & Tarkoma, S.. (2007). XML messaging for mobile devices: From requirements to implementation. Computer Networks, 51(16), 4634.

Bahattin Ozen, Ozgur Kilic, Mehmet Altinel, & Asuman Dogac. (2004). Highly Personalized Information Delivery to Mobile Clients. Wireless Networks: Data Engineering for Mobile and Wireless Access (Guest, 10(6), 665-683.

Nelson Stewart, Jared Spencer, & Nathaniel Melby. (2006). Developing Trust in M-commerce: A Vendor and Certificate Authority Model. Journal of Information Privacy & Security, 2(2), 51-58.

Peter Titmus. (2006). Securing IP telephony systems - best practices. Network Security, 2006(9), 11.

Cite this Document

Join thousands of other students and "spark your studies."

Sign Up for FREE
Related Documents

Studyspark Study Document

Wireless Networking

Pages: 44 (12201 words) Sources: 1+ Subject: Business - Advertising Document: #23526552

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Studyspark Study Document

Free Wireless Networks

Pages: 20 (5062 words) Sources: 1+ Subject: Education - Computers Document: #24305586

Free Wireless Networks Since the construction of the information Superhighway, its' use to distribute information has become phenomenal. Information gathering and dissemination is the most valuable asset for a business to succeed. Demands for more and more efficient means of connecting to the Internet have driven exponential technological advances. So much so that the craze to connect has gone wireless and with this technology an entirely new set of issues, concerns

Studyspark Study Document

Network Support Technologies Case Study

Pages: 10 (2733 words) Sources: 10 Subject: Education - Computers Document: #47154371

Network Support Technologies Case Study Project Scope, Schedule, and Budget Type and Configuration of the Network Hardware Specifications Software Specifications User Policies and Legal Issues Life of Equipment Project Costs Providing an Online Radio Service Second Life Information is now growing at speeds never thought imaginable. Today's world of Information Technology (IT) has provided the dynamic platform in which exponentially growing information resources emerge. This complex arena of knowledge management provides tremendous advantages to modern society. It allows individuals greater

Studyspark Study Document

Wireless LAN and Wireless Man

Pages: 10 (3663 words) Sources: 1+ Subject: Education - Computers Document: #17121704

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Studyspark Study Document

Wireless Broadband Technology

Pages: 50 (20344 words) Sources: 1+ Subject: Education - Computers Document: #96372691

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Studyspark Study Document

Network Security the Practice of

Pages: 5 (1551 words) Sources: 8 Subject: Education - Computers Document: #28134129

Conclusion The purpose of this discussion was to examine the network security measures that are available. The research found that the proper configuration provides the first line of defense as it relates to securing a network. In addition, firewalls serve an essential role in securing networks against outside intrusions. The research also indicates that anti-virus software, encryption software and biometrics allow organizations to secure networks in a more comprehensive manner. There are

Join thousands of other students and

"spark your studies".