Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications.

In:

Submitted By dagrawal
Words 401
Pages 2
Analyze the necessity for different protocols in wireless communications.
An agreed upon guidelines or set of rules for communication is called as protocol. It is very important to agree upon some communication rules otherwise it will fail. If one party speaks French and the other German the communication would surely fail. If they both agree on a single language they can communicate successfully.
The set of communication use don internet is called as TCP/IP. A protocol can be defined as rules that are mutually agreed upon for communication. During communication it is important that both the concerned parties speak a common language, only then communication would work.
The communication protocol used on internet is TCP/IP. It is a group of different protocols and each protocol has its own special function. The protocols have been established by international bodies and are globally used to ensure a common worldwide platform.
For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive one. The maximum speed that can be achieved is 11mbps. The only drawback is that it operates in the unregulated frequency range of 2.4 GHz, which can lead interference to the network traffic from other devices like cordless phone and baby monitors etc.
There is a newer improved version protocol 802.11g, it uses the same frequency range of 2.4 GHz that is commonly used, but this protocol can take transmission speed of maximum 54 mbps. This can still be used for 802.11b equipments but not recommended.
Another protocol is 802.11a standard which is broadcasted in 5 Ghz range where there is lot of less competition and interference from household devices.
There are many more standards being developed in the wireless field and one should weigh out the benefits of a protocol, cost of the equipment and choose the standard that works for you best.
Works Cited
Category. "Quick Tip: Wireless Networking Protocols." Internet / Network Security - Tips, Advice and Tutorials About Internet Security and Network Security. N.p., n.d. Web. 16 Jan. 2013. <http://netsecurity.about.com/cs/wirelesssecurity/qt/qt_wifiprotocol.htm>.
Dalton, James. "Types of Wireless Protocols | eHow.com." eHow | How to Videos, Articles & More - Discover the expert in you. | eHow.com. N.p., n.d. Web. 16 Jan. 2013. <http://www.ehow.com/list_6899836_types-wireless-protocols.html>.

Similar Documents

Free Essay

Analyze the Necessity for Different Protocols in Wireless Communications

...An agreed upon guidelines or set of rules for communication is called a protocol. It’s extremely important to agree on some communication rules otherwise it will fail. Different protocols are needed for different systems to "talk" to each other or communicate. Protocols are used to communicate, authenticate and is also used for error detection and recovery. The protocol allows computers to talk to each other by setting the "ground rules". It allows for data to flow back and forth between the computers. TCP/IP is the most common protocol, and is actually two distinct protocols, married together (TCP (Transmission Control Protocol) and IP (Internet Protocol). Each protocol does a different "job". Others, such as FTP (File transfer protocol) are used for specific duties to be performed. Imagine two people talking on the phone....one talks the other listens, then they reverse, and the talker becomes the listener. That is a Protocol! What happens when they both talk? Neither hears what the other says. But what happens if they both listen, but not talk...no "data' is exchanged. Standards are totally different, although related.....they are ground rules set by a commission so that hardware is compatible amongst similar computers, and assures interoperability. This is done (usually) to ensure backwards compatibility and compatibility from vendor to vendor. For wireless networking there are varieties of protocols and the most popular is 802.11b as it is the most inexpensive one...

Words: 405 - Pages: 2

Free Essay

Cis 505 Wk 9 Assignment 5 Wireless Technology

...CIS 505 WK 9 ASSIGNMENT 5 WIRELESS TECHNOLOGY To purchase this visit here: http://www.activitymode.com/product/cis-505-wk-9-assignment-5-wireless-technology/ Contact us at: SUPPORT@ACTIVITYMODE.COM CIS 505 WK 9 ASSIGNMENT 5 WIRELESS TECHNOLOGY CIS 505 WK 9 Assignment 5 - Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technologies and its role in today’s applications. Write a three to four (3-4) page paper in which you: 1.Compare the pros and cons of 3G and 4G technology to determine the best uses of 3G and 4G technology in today’s applications. 2.Describe how an enterprise would use 3G, 4G, WWAN, and WIAMX to improve business. Explain why they would use one (1) solution over the remaining three (3). 3.Analyze the changes in 4G technology since the printing of the textbook in 2009 and identify those of importance for a user of 4G technology. 4.Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence. 5.Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New...

Words: 1006 - Pages: 5

Free Essay

Ntc360 Summary

...technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: · University policies: You must be logged into the student website to view this document. · Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and telecommunication (8th ed.) Upper Saddle River, NJ: Prentice Hall All electronic materials are available on the student website. Software TestOut LabSim® Network+ Week One: Evolution of the Telecommunications Industry Details Due Points Objectives 1.1 Describe the evolution of the telecommunications industry and its major technologies. 1.2 Identify past and present voice communications technologies. 1.3 Describe telecommunications network structures....

Words: 2225 - Pages: 9

Premium Essay

Syllabus

...|Fundamentals of Networking | Copyright © 2013 by University of Phoenix. All rights reserved. Course Description This course provides a foundation in the basic telecommunications and networking technologies fundamental to the industry and to the broad field of telecommunications. Analog, digital, and radio frequency technologies are covered. Also covered in this course is an introduction to the OSI protocol model, network-switching systems, basics of wireless communications, and network security. Policies Faculty and students/learners will be held responsible for understanding and adhering to all policies contained within the following two documents: • University policies: You must be logged into the student website to view this document. • Instructor policies: This document is posted in the Course Materials forum. University policies are subject to change. Be sure to read the policies at the beginning of each class. Policies may be slightly different depending on the modality in which you attend class. If you have recently changed modalities, read the policies governing your current class modality. Course Materials Goleniewski, L. (2007). Telecommunications essentials. (2nd ed.) Boston, MA: Pearson. Panko, R. R., & Panko, J. L. (2011). Business data networks and...

Words: 2455 - Pages: 10

Free Essay

Wireless Technology

...running head: WIRELESS TECHNOLOGY Wireless technology Justin Armstrong Dr. Biswajit Panja CIS 505 March 4, 2012 Objectives 1. Compare the pros and cons of 3GL and 4GL technology to determine the best uses of 3GL and 4GL technology in today’s applications. 2. Describe how an enterprise would use 3G, 4G, WAN, and WIMAX to improve business. Explain why they would use one (1) solution over the remaining three (3). 3. Analyze the changes in 4GL technology since the printing of the textbook in 2009 and identify those of importance for a user of 4GL technology. 4. Take a position on the following statement, “Wireless application protocol is a necessity for wireless communication organizations and their users.” Then, explain your position with supporting evidence. Compare the pros and cons of 3GL and 4GL technology to determine the best uses of 3GL and 4GL technology in today’s applications. So what are the benefits or otherwise of using a 3GL over a 4GL and vice versa. For me it certainly depends on all the usual factors that drive any technology decision. Cost of product, support, flexibility, the human factor, tool lifecycle, vendor direction and target platforms being a few that come to mind instantaneously. (Dare, 2008) The pros of 3GL * 3GL’s are quicker to react to emerging markets and development trends: Generally the suppliers of these 3GL tools are inventing the future. They don’t often agree with each other but they certainly have the...

Words: 1538 - Pages: 7

Free Essay

Voip and Unified Communications Via Wi-Fi Handset

...Title Advancement of VOIP and Unified Communications via Wi-Fi Handset “The technology involved in VoIP software and VoIP information is forever changing and updating”(VoIP Telephony Updates… 2008 -5). Abstract This paper gives the information on the VOIP-voice over internet protocol which is the technology that is been used for the voice communications by using the different types of the IP based networks in order to deploy the devices of the VOIP users. The VOIP technology is having different types of the security issues in the VOIP and Wi-Fi along with the security measures. This paper will deal with the VOIP technology, unified communications and Wi-Fi handset. Table of contents Chapter 1 Introduction to the research………………………………………………………………6 1.1 Aim 1.2 Objectives 1.3 Introduction 1.4 VOIP deployment 1.5 The threats and attacks in the VoIP System 1.5.1 Spoofing 1.5.2 The interception or eavesdropping 1.5.3 The denial of service 1.5.4 The spam over VoIP Chapter 2 Literature review……………………………………………………………………………10 2.1 The security methods 2.2 Call Setup and VoIP Registration 2.3 The Protocol selection 2.4 The Mobile VOIP 2.5 The VOIP handset 2.6 The IP telephony 2.7 The Protocols of VOIP Chapter 3 Research Methodology……………………………………………………………………….15 3.1 Introduction 3.2 Research methodology chosen 3.3 Qualitative research methodology 3.4 Quantitative research methodology 3.5 Research design: Case study approach 3.6 Case study approach ...

Words: 10967 - Pages: 44

Free Essay

554 Week 3

...554 Week 3 Patton-Fuller Community Hospital Web Portal CMGT 554 Patton-Fuller Community Hospital Web Portal The way of the net is how all businesses are being conducted recently. Hospitals as well as any other company should learn to include this technology to increase their business capabilities. The Patton-Fuller Hospital knows this and is attempting to find latest methods to use this technology in everyday business. There are already some uses inside the hospital and this document will talk about a few more they can include. Apart from the internal system card, there are not any devices to help in avoiding collisions, attenuation, corrupt along with other line problems The smart buttons will assist avoid collisions. Presently all system transmissions run through a direct link with the hospitals Ethernet. The buttons will decrease congestion on the system and direct traffic to where it requires going. The buttons will also assist with protection of patient health data. Information will only require traveling across the Ethernet lines that are required and would not be transmitted via an incorrect port. The button may also confirm when the packet has taken any extra hops and been intercepted and changed. The e-mail system must include a 3rd party supplier, such as Proofpoint, to filter out all organization e-mails. The Proofpoint server will filter all organization email messages according to set principles and criteria. E-mail correspondence with patient health data whether...

Words: 1270 - Pages: 6

Free Essay

554 Week 3

...Patton-Fuller Community Hospital Web Portal CMGT 554 Patton-Fuller Community Hospital Web Portal The way of the net is how all businesses are being conducted recently. Hospitals as well as any other company should learn to include this technology to increase their business capabilities. The Patton-Fuller Hospital knows this and is attempting to find latest methods to use this technology in everyday business. There are already some uses inside the hospital and this document will talk about a few more they can include. Apart from the internal system card, there are not any devices to help in avoiding collisions, attenuation, corrupt along with other line problems The smart buttons will assist avoid collisions. Presently all system transmissions run through a direct link with the hospitals Ethernet. The buttons will decrease congestion on the system and direct traffic to where it requires going. The buttons will also assist with protection of patient health data. Information will only require traveling across the Ethernet lines that are required and would not be transmitted via an incorrect port. The button may also confirm when the packet has taken any extra hops and been intercepted and changed. The e-mail system must include a 3rd party supplier, such as Proofpoint, to filter out all organization e-mails. The Proofpoint server will filter all organization email messages according to set principles and criteria. E-mail correspondence...

Words: 1267 - Pages: 6

Premium Essay

Global

...and Strategic Planning Analysis | |The Week Three learning team assignment is divided into two halves. In the first half of the assignment, Learning Team “C” will | |conduct a country risk analysis for the selected global business venture in South Africa. The topics that will be analyzed are | |the political, legal, and regulatory risks; the exchange and repatriation of funds risks; and the competitive risk assessment. | |The second group of analyses will evaluate the taxation and double taxation risks; the four P’s of market risks, and will analyze | |the distribution and supply chain risks. The final group in the risks analysis seeks to address the physical and environmental | |challenges to entering and operating in a target market, analyze the social and cultural risks, and address the cyber or | |technological risks. | |In the second half of the Week Three assignment Learning Team “C” will summarize the strategic planning process by defining and | |clarifying the mission and objectives, performing a SWOTT analysis of South Africa, and by selecting a strategy. The second half | |of the assignment will also include selecting and justifying an appropriate mode of entry for the global product or service; | |controlling and evaluation of the planning...

Words: 1252 - Pages: 6

Premium Essay

Test Paper

...The Necessity of Information Assurance 1 The Necessity of Information Assurance Adam Smith Student ID: Western Governors University The Necessity of Information Assurance 2 Table of Contents Abstract ........................................................................................................................................... 5 Introduction ..................................................................................................................................... 6 Project Scope .............................................................................................................................. 6 Defense of the Solution ............................................................................................................... 6 Methodology Justification .......................................................................................................... 6 Explanation of the Organization of the Capstone Report ........................................................... 7 Security Defined ............................................................................................................................. 8 Systems and Process Audit ............................................................................................................. 9 Company Background ................................................................................................................ 9 Audit Details ...........................

Words: 12729 - Pages: 51

Premium Essay

Unit

...2008 environments) that would involve installation, configuration, testing, maintenance and documentation of the worksite network and its components, and to properly document the technical information in all involved activities. Such documentation will be used as the source material for Items 2 and 3 defined in the Deliverables section of this document. Possible example projects could be (but are not limited to): Install/maintain/upgrade site LAN cabling/wiring Survey, inventory and document networking layout and assets Install, configure and/or support Windows 7 desktop as network clients Install, configure and/or support Windows Server 2008 for a network Install, configure and/or support a site LAN (local area network, wired or wireless) General network user...

Words: 6762 - Pages: 28

Free Essay

Consumer Brand Switching Behaviour in Indian Telecom Industry

...THE INDIAN INSTITUTE OF PLANNING AND MANAGEMENT, AHMEDABAD THESIS TOPIC “Critically analyze the customer preference and satisfaction measurement in Indian Telecom Industry” SUBMITTED BY Naman Shah PGP/SS/06-08 ALUMNI REFERENCE ID: SS/06-08/AHD/MKTG/2 SUMISSION DATE: 27th August, 2008 GUIDED BY Prof. Pabitra Ranjan Chakravorty Senior Research Associate (Marketing) IIPM, Ahmedabad. I LETTER OF CONSENT IIPM Ahmedabad 19, Inquilab Society, Gulbai Tekra, Ahmedabad-380015 To, The Dean, IIPM-Ahmedabad Date: November 6, 2007 Respected Sir, Subject: Letter of Consent I, Prof. Pabitra Ranjan Chakravorty, a faculty of Marketing Management of IIPM-Ahmedabad, expressing my interest in guiding for a thesis on “To critically analyze the customer preference and satisfaction measurement in Indian Telecom Industry” to Mr. Naman Shah, a student of PGP/SS/06-08. This is to inform that I shall support him as a guide for his thesis on the above mentioned topic and extend my knowledge and help in all ways possible. Thank You. Yours faithfully, Prof. Pabitra Ranjan Chakravorty. II LETTER OF APPROVAL III PREFACE The customers are very important and play a crucial role in any process of marketing. Today, customers are the kings of the market because the customer loyalty and customer preference are built by the products and the services offered to the customers and they seek for the more benefits and money’s worth for the amount they spend. That is where the...

Words: 25735 - Pages: 103

Premium Essay

Main Paper

...Special Publication 800-48 Wireless Network Security Tom Karygiannis Les Owens 802.11, Bluetooth and Handheld Devices NIST Special Publication 800-48 Wireless Network Security 802.11, Bluetooth and Handheld Devices Recommendations of the National Institute of Standards and Technology Tom Karygiannis and Les Owens C O M P U T E R S E C U R I T Y Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8930 November 2002 U.S. Department of Commerce Donald L. Evans, Secretary Technology Administration Phillip J. Bond, Under Secretary for Technology National Institute of Standards and Technology Arden L. Bement, Jr., Director W IRELESS NETWORK SECURITY Note to Readers This document is a publication of the National Institute of Standards and Technology (NIST) and is not subject to U.S. copyright. Certain commercial products are described in this document as examples only. Inclusion or exclusion of any product does not imply endorsement or non-endorsement by NIST or any agency of the U.S. Government. Inclusion of a product name does not imply that the product is the best or only product suitable for the specified purpose. Acknowledgments The authors wish to express their sincere thanks to numerous members of government, industry, and academia who have commented on this document. First, the authors wish to express their thanks to the staff at Booz Allen Hamilton...

Words: 52755 - Pages: 212

Free Essay

Management Information Systems

...to be added/modified) IT Planning -begins with an organizational strategic plan -states  the  firm’s  mission,  goals,  and  steps  to  reach  those  goals -IT architecture describes  the  way  an  org’s  info  resources  should  be  used  to  accomplish  its  mission -includes both technical (hardware operating systems) and managerial aspects (managing the IT dpt, how area managers will be involved) IT strategic plan- LT goals that describe the IT infrastructure and major IT initiatives to achieve the organization’s  goals -it must meet three main objectives: -must  be  aligned  with  the  org’s  strategic  plan -must provide for an IT architecture that networks users, apps, and databases -must efficiently allocate IS resources among different projects so they can all be completed on time, within budget, and function properly IT steering committee- composed of managers/staff who rep diff organizational units -they  establish  IT  priorities  to  ensure  MIS  function  is  meeting  the  org’s  needs -it links corporate and IT strategy, approves resource allocation for MIS, establish performance measures for MIS to make sure they are met -ensures that employees get the resources they need to do their job After the IT strategic plan, next is IS operational plan; set of projects in support of the IT strategic plan -includes the...

Words: 24496 - Pages: 98

Premium Essay

Voice, Video, Network

...VOICE, VIDEO, AND DATA NETWORK CONVERGENCE VOICE, VIDEO, AND DATA NETWORK CONVERGENCE ARCHITECTURE AND DESIGN, FROM VOIP TO WIRELESS JUANITA ELLIS CHARLES PURSELL JOY RAHMAN Amsterdam Boston London New York Oxford San Francisco Singapore Sydney Tokyo Paris San Diego This book is printed on acid-free paper. Copyright 2003, Elsevier Science (USA). All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Permissions may be sought directly from Elsevier’s Science & Technology Rights Department in Oxford, UK: phone: (+44) 1865 843830, fax: (+44) 1865 853333, e-mail: permissions@elsevier.com.uk. You may also complete your request on-line via the Elsevier Science homepage (http://elsevier.com), by selecting “Customer Support” and then “Obtaining Permissions.” Explicit permission from Academic Press is not required to reproduce a maximum of two figures or tables from an Academic Press chapter in another scientific or research publication provided that the material has not been credited to another source and that full credit to the Academic Press chapter is given. Academic Press An imprint of Elsevier Science 525 B Street, Suite 1900, San Diego, California 92101-4495, USA http://www.academicpress.com Academic Press 84 Theobald’s Road, London WC1X 8RR...

Words: 125371 - Pages: 502