Wi-Fi Has An Important Role In Wireless Networks

Great Essays
1. Introduction Today, Wi-Fi plays an important role with connecting users to the digital world. While it remains as the most popular technology for networking, it is crucial to understand the limit of certain wireless protocols and how it works in different situations. The most recent Wi-Fi protocol that this report will focus on is, 802.11ac, also known to be the next generation for wireless networks to be equipped with new technologies that could provide faster speeds, capacity, and range. The predecessor, 802.11n, wireless protocol had lower limitation of its full potential to keep the ever growing need of today’s wireless demand. 802.11n lacked the support of the increasing number of devices on the same network, as well as, supporting each device 's high usage of bandwidth. This includes, but not limited to, gaming, higher quality video streaming, more advanced client devices, data backup, and VoIP. As 802.11n was the standard wireless protocol to supporting everyday devices and applications, the ratification of 802.11ac has progressed in technology and its impact in wireless networking. Within just three years after the ratification of 802.11ac, this technology has become the new advanced Wi-Fi standard in the wireless ecosystem. Due to it being the most advanced standard available in today’s …show more content…
As quoted in ExtremeTech, “[t]he theoretical max speed of 802.11ac is eight 160 MHz 256-QAM channels, each of which are capable of 866.7 Mbps, for a total of 6,933 Mbps” in order to provide a higher transfer rate. In today’s real world environment, the true throughput capacity is limited from the client device and not the access points. Current high end products with 80 MHz, 3x3 spatial stream, and 256QAM have max data rate of 1300 Mbps and a throughput of 910 Mbps. This suggests that clients are not receiving the advertised speed by

Related Documents

  • Improved Essays

    IEEE802.11ad:- IEEE 802.11ad is an amendment that defines a new physical layer for 802.11 networks to operate in the 60 GHz millimeter wave spectrum. This frequency band has significantly different propagation characteristics than the 2.4 GHz and 5 GHz bands where Wi-Fi networks operate. Products implementing the 802.11ad standard are being brought to market under the WiGig brand name. The certification program is now being developed by the Wi-Fi Alliance instead of the now defunct WiGig Alliance.[23] The peak transmission rate of 802.11ad is 7 Gbit/s 802.11ad leverages the Wireless Gigabit Alliance specification.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Nt1330 Unit 1 Assignment 1

    • 1566 Words
    • 7 Pages

    A captive portal forces a device connecting to the wireless network to display a specific web page, before allowing access to the Internet [57]. This web page should be customized to show company information, and require guests to accept a user agreement before being permitted access to the Internet through company resources. In addition, the captive portal will direct the guest to get the current Wi-Fi password from the company receptionist. The Cisco 500 Series Wireless Access Point comes with a built-in, customizable captive portal…

    • 1566 Words
    • 7 Pages
    Great Essays
  • Superior Essays

    Nt1330 Unit 3 Assignment 1

    • 1461 Words
    • 6 Pages

    These wireless access points also come with the newest 802.11ac technology. They are also equipped with dual bank 2.4 and 5 GHz for better bandwidth…

    • 1461 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    802.11a – This was one of the first wireless standards. It operates in the 5GHz radio band and can achieve a maximum of 54Mbps. 802.11b – This was the more preferred choice because of the lower price and higher range.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    2.4GHz - 2.485GHz • Secondary network range- 433.4MHz - 473MHz Step6: Setting time for node movement to move and setting the destination Step7 : Traffic is created for 30 nodes Step8: Probability distribution algorithm is applied Step9: When traffic is considered the starting time and ending time of the traffic is considered. Step10: If the starting time of the transmission in the source is less than the…

    • 306 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    NS-2 offers a poor graphical support, no Graphical User Interface (GUI), the subscribers have to directly face to text commands of the electronic devices. Because of the continuing modifying the code base, the result may not be consistent and consist bugs. NS-2 cannot simulate issues of the power consumption, bandwidth or energy saving in WSN. NS-2 has a scalability issue no. of nodes cannot be greater than 100.…

    • 1180 Words
    • 5 Pages
    Improved Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Great Essays

    Pm3110 Unit 4 Test Paper

    • 1148 Words
    • 5 Pages

    Each virtual way is dispensed an altered measure of transfer speed. Virtual ways don't powerfully change their data transfer capacities past what has been assigned. 4. What are the three layers of IEEE 802 reference models? What are their major functions?…

    • 1148 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Finally, the potential issues or risks while using the mobile wireless will be discussed. 1. the technical details of FDMA, TDMA and CDMA (1) FDMA Frequency Division Multiple Access (FDMA) bandwidth is divided into narrow frequency slots and is use to allocate a unique frequency band or channel that a user is free to transmit or receive all the time over the shared…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The first challenge that comes to mind for small offices or home offices is the IT department’s responsibility of keeping the data secure. Especially when an employee is logging into the network from home. The company would have to have a firm work-from-home policy in order to protect the company’s data. Another challenge would be where to place the access points in a small building. The configuration of the AP would be an important factor in placement for a small building or home to make sure there are no dead spots.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i - PL_{(i,j)}\geq\delta_j; \forall (i,j)\in\mathcal{V}. \label{eqn:radio sensitivity} \end{equation} In equation~\ref{eqn:radio sensitivity}, $P_i$ is the transmit power (in dBm) at node $i$, $PL_{(i,j)}$ (in dB) is the pathloss between node $i$ and node $j$ and $\delta_j$…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    This project is a milestone in easing the life of the clients. This project overcomes the frustrations in waiting for one's turn in a long queue. The use of mobile phones was established and it was a whole new factor in the communications access mode. This was proved correct based on the test conducted by the researcher in the UNO-R accounting office.…

    • 598 Words
    • 3 Pages
    Improved Essays