The Importance Of Wireless Communication

Decent Essays
Introduction Wireless is a growing technology that will continue to evolve. Standards aid in understanding how to best utilize wireless transmission. Businesses must understand the 802.11 standards when determine how to utilize wireless networks within their organization. 802.11 standards have continued to evolve to meet the needs of organizations and residential users alike. However, wireless designs must address several propagation issues unrelated to wired networks. Wireless propagation concerns and understand before implementing a wireless network in a home or business.
Important aspects of the 802.11 standards Wireless Local Area Network (LAN) technology today is 802.11. Working Group of the IEEE 802 Committee standardizes Wireless
…show more content…
213). Attenuation effects wireless transmission just like wired transmission. Attenuation is a natural consequence of signal transmission over long distances (Siles, Riera, & Garcia-del-Pino, 2015). According to Panko & Panko (2015), "Inverse square law attenuation is due to the signal spreading out as a sphere and so becoming weaker at each point of the sphere"( p.217). This leads to the next issues with wireless transmission of dead zones. Dead zones are locations were a signal is unable to reach causing a loss of connectivity. A good example of a dead zone may be a corner office too far away from the wireless access point or inside of an elevator. However, the most severe propagation difficulty with WLAN frequencies is multipath inference (Panko & Panko, 2015). Interface can make or break the trust in a wireless network with end-users. Just the minor change in frequency can negatively impact the usability and strength of a wireless network. Multipath interface may cause the signal to range from strong to nonexistent with a few centimeters (Panko & Panko,

Related Documents

  • Decent Essays

    For the office users, the main form of connection will be via LAN wired connections connect directly to the Switches. The laptops PC's and tablets will connect via a secure wireless connection that will be provide using 2 Cisco Small Business WAP551 Wireless Access Point. The first location is the senior offices and second location the common office hosting most of the other employees. The router to used is a Cisco 2951 Integrated Services Router (ISR), this router delivers highly secure data, voice, video, and application. It has 3 integrated gigabit Ethernet ports that are enough to serve the office.…

    • 216 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    However, it was soon realized that the 60 GHz standard is not likely to be an evolutionary move and, therefore, a parallel standardization effort in the 5 GHz band was started to address this intention. As a result, two 802.11 standards , known as 802.11ac and 802.11ad, that address physical layer upgrades exist. However, 802.11ac & 802.11ad is now accepted as the evolutionary upgrade from 802.11n. 3.…

    • 620 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    IEEE 806.15.4 aims at short distance double direction communication with lower complexity,…

    • 358 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Nt1310 Unit 6 Essay

    • 565 Words
    • 3 Pages

    802.7 IEEE 802.7 is a sub-standard of the IEEE 802 which covers broadband local area networks with a coaxial cable. This standard was developed for cable internet companies. e. 802.11 (a, b, g, n) – Wireless Network Standards 802.11 is the collection of standards setup for wireless networking. They include four different standards including; 802.11a, 802.b, 802.11g and the most recent standard 802.11n. Each standard uses a frequency to connect to the network and has a defined upper limit for data transfer speeds.…

    • 565 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 3 Case Study

    • 835 Words
    • 4 Pages

    Internet Connectivity – Wide range of Internet connectivity should be considered based on the size of the company. Wired and Wireless connections should be arranged with high frequency range. Network…

    • 835 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The issues and possible risks in using wireless communication. There are few security risks occurring in mobile and wireless user: A. Intrusion - networks are more open to intruder access unless protective measures (such as passwords, encryption and identifier disabling) are adopted and this may result in a greater susceptibility to theft or misuse of information contained on networks, unauthorized destruction or modification of data, and abuse of network capacity B. Leeching - bandwidth can be used by intruders at the expense of legitimate businesses and users C. Exploitation - network access can be misused to launch denial of service (DoS) attacks against third parties, transmit illicit material such as child pornography, or engage in other criminal activities. [10] 5. Conclusion: The report introduced three wireless generations which have been using for the last few decades.…

    • 1458 Words
    • 6 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 2 Case Study

    • 177 Words
    • 1 Pages

    The first challenge that comes to mind for small offices or home offices is the IT department’s responsibility of keeping the data secure. Especially when an employee is logging into the network from home. The company would have to have a firm work-from-home policy in order to protect the company’s data. Another challenge would be where to place the access points in a small building. The configuration of the AP would be an important factor in placement for a small building or home to make sure there are no dead spots.…

    • 177 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    Nt1330 Unit 3 Assignment 1

    • 1123 Words
    • 5 Pages

    Use of multiple routers in interconnected networks: Exchanging information about destination addresses using a dynamic routing protocol. A router has different physical ways to operate network connections, such as: • Fibre optic • Copper cables • Wireless A router also contains several firmware for different networks’ protocol standards.…

    • 1123 Words
    • 5 Pages
    Improved Essays
  • Decent Essays

    Nt1310 Unit 3

    • 115 Words
    • 1 Pages

    Network security specialists detect, prevent and resolve security threats to computer networks. Security is an important aspect in businesses operating various Networking systems. Securing your company’s network consists of identifying all devices and connections on the network; setting boundaries between your company’s systems, enforcing controls to ensure that unauthorized access can be prevented, and contained. Network should be separated from the public Internet by strong user authentication mechanisms and policy enforcement systems such as firewalls. Another important factor is that Wireless Local Area Network should be separate from your company main network so that traffic from the public network cannot navigate through the internal…

    • 115 Words
    • 1 Pages
    Decent Essays
  • Improved Essays

    User connectivity will be controlled and authenticated through active directory. User devices will require and object to be created in active directory which will be used to authenticate the device using 802.1x. When a user device is connected to the network it will initially communicate on a VLAN will only be allowed to communicate with active directory. Then once the device has been authenticated it will place the device on the appropriate VLAN that it will operate on. Any device that has not been set up in Active Directory will be placed into a null VLAN which will not grant access to the network.…

    • 707 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    In each scenario mentioned in previous section, we formulate network topologies as undirected graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ with $n$ nodes and $m$ edges having demand at a node $i$ in $\mathcal{V}$ given by $d_i$. Here, $\mathcal{V}$ indicates set of nodes and $\mathcal{E}$ indicates set of edges in the topology. A link would exist in the topology between node $i$ and node $j$, if they are in the communication range of each-other satisfying constraint, \begin{equation} P_i - PL_{(i,j)}\geq\delta_j; \forall (i,j)\in\mathcal{V}. \label{eqn:radio sensitivity} \end{equation} In equation~\ref{eqn:radio sensitivity}, $P_i$ is the transmit power (in dBm) at node $i$, $PL_{(i,j)}$ (in dB) is the pathloss between node $i$ and node $j$ and $\delta_j$…

    • 431 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    This paper describes about the notion of Free Wi-Fi in New York City, which is called LinkNYC and elaborates the system in terms of its network configuration. The network diagram will be provided to illustrate the overall system. Moreover, identifying the cost associates in this project. Most important, expounding how this system could affect towards marketing for smartphone users. Introduction…

    • 1026 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Our Wi-Fi network is based on the IEEE 802.11 b/g standards, which is the most commonly used…

    • 884 Words
    • 4 Pages
    Great Essays
  • Improved Essays

    Natural Driving Quiz

    • 462 Words
    • 2 Pages

    DIGITAL FORENSIC AND INCIDENT REPORTING QUIZ 1. Destroying data, on a hard drive, is relatively easy and can be done one of two ways: a. Destroying the platters b. Wiping the entire hard drive c. Placing magnets on a hard drive d.…

    • 462 Words
    • 2 Pages
    Improved Essays
  • Brilliant Essays

    New optimization and management services for 3G wireless networks using CELNET Xplorer. Bell Labs Technical Journal, 9(4), 101-115. Retrieved Tuesday, October 10, 2006 from the Academic Search Premier database. Cohen, L., Finn, R., Wilkinson, A. & Arnold, J., (2002). Professional Work and Management.…

    • 3010 Words
    • 13 Pages
    Brilliant Essays