Free Essay

Wireless Network Standards

In:

Submitted By jrockisme
Words 305
Pages 2
The 802.11B was an amendment to the original 802.11 standard released in because the original did not have fast enough speeds to be sufficient to support the needs that the technology required. 802.11B added speeds of 5.5 and 11 Mbps. The 802.11B standard also supports wireless devices that are up to 115 meters or 375 feet apart. If the distance is exceeded or as it grows farther apart the standard states that the signal lower its transfer speed instead of completely dropping its signal if it falls out of range. The 802.11A standard specifies a maximum of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions. The standard has devices that are generally no more than 100 ft. apart. The 802.11G standard was developed as a “best of both worlds”, type of standard in an attempt to keep the highly stable standard features of the 802.11b standard but include the higher transfer rates of the 802.11A standard. This standard operates on the ISM band and not the U-NII band so it can reach farther with its signal but the band is highly crowded. The 802.11N standard was being established doffing the writhing of the text book and was projected to be able to transfer 100 Mbps to 500 Mbps depending on which proposal was approved. I found that available technology on wireless N technology is capable of 270 Mbps on a particular website putting it to the test. I feel that standards are beneficial to wireless networking and do not limit new technology. They allow for better connection speeds over longer ranges. This allows for new technologies to do things over the internet at a faster speed and keep up with the trend that faster is better.

Similar Documents

Free Essay

It241 Week 3 Wireless Network Standards

...802.11 standard in 1997; this was to be known as the first WLAN standard, also known as 802.11 Prime. Throughout the years these standards have been ratified and amended. The first revision was in 1999 with 802.11b, later in 1999 802.11a was amended; in 2003 802.11g was amended and 802.11n was amended in 2009. Of these four standards there are some similarities and differences. The differences between these standards are as follows: * 802.11b – 2.4 GHz ISM, uses HR-DSSS (High Rate Direct Sequence Spread Spectrum), Data rates using DSSS are 1 and 2 Mbps, HR-DSSS uses 5.5 and 11 Mbps. Backward compatible to 802.11 Legacy (Prime) DSSS only. * 802.11a – 5 GHz - UNII, uses Orthogonal Frequency Division Multiplexing (OFDM) allowing for 5 GHz RF frequency’s operating in three different frequency bands called the Unlicensed National Information Infrastructure (UNII). These frequency ranges are: * UNII – 1: 5.150 – 5.250 * UNII – 2: 5.250 – 5.350 * UNII – 3: 5.725 – 5.825 Data rates under this standard were mandatory at 6, 12, and 24 Mbps with optional support for 9, 18, 36, 48, and 54 Mbps. This standard is not backwards compatible. * 802.11g – 2.4 GHz ISM, this standard utilized Extended Rate Physical (ERP) to enhance the physical layer, by using ERP-OFDM & ERP-DSSS/CCK (Complementary Code Keying) Data rates of 6, 9, 12, 18, 24, 36, 48, and 54 Mbps are made available. (ERP-OFDM: 6, 12, 24 Mbps) (ERP-DSSS/CCK: 1, 2, 5.5, 11). This standard is backward...

Words: 484 - Pages: 2

Free Essay

Wireless

...TERM PAPER Wireless LAN Security Enabling and Protecting the Enterprise INSIDE INSIDE ∆ Wireless LAN Technology ∆ ∆ ∆ Benefits of Wireless LANs Security Risks and Technical Challenges Recommendations WIRELESS LAN SECURITY Contents Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Wireless LAN Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Benefits of Wireless LANs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Simplified Implementation and Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Extended Reach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Increased Worker Mobility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Reduced Total Cost of Ownership and Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 Security Risks and Technical Challenges . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 “Leaky” Buildings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Unapproved Deployments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 Exposure of Wireless Devices . . . . . . . . . . . . . . . ....

Words: 2559 - Pages: 11

Premium Essay

Cvcvcv

...Wireless Wide Area Networks: Trends and Issues Wireless Wide Area Networks: Trends and Issues Mobile computing devices are getting smaller and more powerful, while the amount of information is growing astronomically. As the demand for connecting these devices to content-rich networks rises, WWAN technology seems like the perfect answer. But today's wireless WANs have some limitations. This white paper discusses those limitations and how NetMotion™ overcomes them. · Specialized equipment and custom applications were needed for deployment over these proprietary wireless systems. · Often the wireless infrastructures themselves were difficult to deploy. · Only a small percentage of the working population was mobile, so corporations considered wireless data deployment a significant investment with little return. Why the resurgence of interest in wireless data networking technologies now? In the late twentieth century, a few interesting social and technological developments took place. In the late 1990's, businesses began seeing the economic benefit of having employees who work away from their campuses. These remote (and sometimes nomadic) workers needed access to everyday corporate information to do their jobs. Providing workers with remote connectivity became a growing challenge for the information staff. Handheld and pocket-sized computers became powerful enough to be useful. The convergence of Internet networking technologies made IP the de facto standard. New standards such...

Words: 3176 - Pages: 13

Premium Essay

Itm425: Introduction to Computing

...is no longer a major barrier to wide use of wireless information systems. Wireless technology is evolving and becoming the preferred choice for connecting hardware and transferring information. Employing a wireless system allows corporations, like cruise ships, to provide a wireless service to its passengers without comprising information security. Without wireless technology this service would be impossible. To set up a basic wireless network, you will need a network card/adapter, a wireless router, and access points. The network card is the most important hardware component of wireless networking. The wireless router and access points are used to increase performance, accommodate more computers, and increase the network’s range. Network adapters are used to interface a computer to a network. They can be found as a traditional PCI card, PC Card adapter, USB adapter, media adapter, or an integrated wireless adapter chip. A wireless router allows multiple devices to access one internet connection. Through radio frequencies, data is transferred between devices connected to the network. Access points serve as the central receiver and transmitter of these radio frequencies. Other factors to consider when setting up a wireless network are compatibility, expenses, limitations due to distance and building structure, and Wi-Fi network security. Wireless network technology, also referred to as WLANs, uses an industry standard known as IEEE 802.11 that enables computers...

Words: 1299 - Pages: 6

Premium Essay

Wireless Network Connections

...Wireless Network Connections NT1110 Computer Structure and Logic Debbie Beals, Bill Fry, Donald Phillips Introduction If you find yourself in a fast food restaurant, trendy coffee shop or Hotel, your chances of being around a wireless network in the world today are very good. You may connect your computer at home or other electronic devices to a wireless network, also called WiFi or 802.11 networks. Wireless networks are easy to set up and mostly inexpensive. Very soon wireless networking may be available from just about anywhere and at any time. Bluetooth is a universal wireless standard for connecting various digital devices. Bluetooth is simply a way to connect devices to one another without the use of cables that transmits the signal over short distances. Bluetooth is “cable elimination technology”. Wireless Connections What is Wireless? Wireless communication is the transfer of information between two or more points that are not connected by an electrical conductor. The most common wireless technologies use radio. With radio waves distances can be short, such as a few meters for television or as far as thousands or even millions of kilometers for deep-space radio communications. It encompasses various types of fixed, mobile, and portable applications, including two-way radios, cellular telephones, personal digital assistants (PDAs), and wireless networking. Other examples of applications of radio wireless technology include GPS units, garage door openers...

Words: 2795 - Pages: 12

Free Essay

Tft2

...recent breach of our electronic health record (EHR) systems, it is necessary that policies pertaining to access and control mechanisms of health records be reviewed and/or modified to mitigate future incidents SPECIFIC GOALS: 1.) Implement a standard based on Attribute Based Access Control (ABAC) to ensure that electronic health records (EHR) are protected from unauthorized entities 2.) Implement a standard for the use of remote access methods to information systems 3.) Implement a standard that ensures that access to electronic health records (EHR) is audited and backed up without changes or over writing INFORMATION SECURITY POLICY GOALS: * Confidentiality = data or information is not made available or disclosed to unauthorized persons or processes * Unauthorized access = the INABILITY of unauthorized persons to read, write, modify, or communicate data/information or otherwise use any system resource * Integrity = data or information has not been altered or destroyed in an unauthorized manner * Availability = data or information is made accessible and usable upon demand by authorized users * Legislative and Regulatory Requirements = policies comply with Federal and HIPAA regulatory standards * Business continuity plan integration = policy revisions fall within the business continuity plan of protecting the organization from exposure to internal and external threats ADHERANCE TO SECURITY POLICY GOALS: * Information Security Training...

Words: 2279 - Pages: 10

Free Essay

Wireless Communications

...Wireless Communications Paper Wireless communication involves the transmission of data from one point to another without the need to run cabling in-between. Although it seems relatively new to the end user today, it has surprisingly been around for longer than you may think dating back to the late 1800’s. The first wireless technology discovered was the Radio Frequency (RF signal). Thomas Edison and Nikola Tesla were two inventors that played a huge role in developing the RF technology we still use today. By conducting many experiments using wireless technology they together came up with the RF signal that was first implemented in WWII by the US Military. It wasn’t until the 1970s’ that the first ‘wireless network’ was developed called ALOHAnet. This new wireless network was made to communicate from island to island is Hawaii. Using LAN technologies and a 400 MHz frequency band ALOHAnet was the predecessor of many wireless technologies to come. Today we have many wireless technologies that are used for many different types of services. If you’ve used Bluetooth technology then you’ve used a Personal Area Network (PAN). A PAN network is intended for short ranges and typically controlled and used by a single person. If you’ve connected to the internet at work, a coffee shop, work, or at school then you’ve connected to part of a Wide Area Network (WAN) configured into a Local Area Network (LAN). Most people know a typical WAN by the name of WIFI, even though that’s just a business...

Words: 786 - Pages: 4

Premium Essay

Wireless Technologies

...Wireless Technologies Introduction As wireless technology has begun to mature, the demand for wireless products has increased as new applications for the technology are realized. One application for wireless technology at the U.S. Naval Academy is to use the wireless capability to enhance classroom instruction. Currently the Electrical Engineering and Physics Departments have wireless access points and wireless laptops/desktops available for classroom instruction. The purpose of this report is to provide the technical research necessary to aid decision makers in determining which wireless technologies the Naval Academy should invest. Background In a wireless network, computers communicate with the network through a radio path vice a cable. The device that contains the radio and connects to the wired network is called the “Access Point”. Each client that communicates with the access point must have a wireless PCMCIA card. Once both devices communicate via radio transmission, network access can begin. Each client is configured to communicate with a single access point. A client can move from one access point to another. Roaming from access point to access point (cell to cell), similar to cellular telephone technology, is possible. Technology Discussion There are three wireless technology standards on the market today: Bluetooth, 802.11b, and 802.11a. A new standard, 802.11g, was recently approved by IEEE and products using this technology are expected...

Words: 1089 - Pages: 5

Premium Essay

Netw 589 Entire Course Wireless Communication Ended Feb-2015 Keller

...NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller Click Link Below To Buy: http://hwcampus.com/shop/netw-589-entire-course-wireless-communication-ended-feb-2015-keller/ Or Visit www.hwcampus.com NETW 589 Entire Course Wireless Communication Ended Feb-2015 Keller NETW 589 Case Study Wireless Communication Week 5 Keller 12 Power Point Slides Plus Speaker Notes Case Description The organization you work for has leased a building next door to the existing building. The local area networks in the new building and the existing building must be linked to each other. The distance is 657 feet. Here is the relationship of the two buildings. Notice that the blue dashed line showing the route of the link crosses a parking lot not under your control. It also crosses a public street. Both buildings are two stories tall. From the second floor or the roof of each building there is a clear line of sight above the expected height of any vegetation currently in the area. You have been assigned the task of determining the available wireless methods that could be used to connect the buildings to each other and presenting these options to the executive team. The executive team consists of the CEO, the CFO, and the managers of the five business units. They will need to know the following about each option in terms that nontechnical staff can readily understand:  The way the method transmits data back and forth  The advantages of the method  The disadvantages...

Words: 2200 - Pages: 9

Premium Essay

Test

...AN ENTERPRISE SETTING 2 A1 - Abstract Since 1999 wireless devices have become a necessity in enterprises. While increasing convenience, connectivity, and productivity, they also pose an unprecedented threat to network security guarding, which has literally taken to the airwaves. This paper will deal with vulnerabilities and risks regarding access points (APs) in a wireless network (WLAN) connecting to a wired local area network (LAN) in enterprises. Data for this paper will come from published academic papers, industry publications including white papers and surveys, and industry specialists. It will also include definitions of terms, policy and procedures that affect access points, and current practices regarding rogue APs. A case study will be presented for a fictional enterprise with multiple locations that has standard procedures, policies, and protocols in place, but recent events have questioned their ability to control access points with the discovery of rogue devices hidden in several office locations. Industry warnings about access points span the past thirteen years, and still new articles appear saying similar warnings, with only the solutions evolving with the technology. Suggested solutions will include security literacy regarding APs and their devices and their compliance; security audits to re-evaluate configurations of current hardware and software, inventory of current APs, wireless devices, ports, stations and their...

Words: 18577 - Pages: 75

Premium Essay

Wireless Glossary

...Term Advanced Definition An IEEE standard (802.3) for operating 10 Mbps Ethernet ... 10BaseT: networks (LANs) with twisted-pair cabling and a wiring hub. The weakening of a wireless signal that occurs as it passes through objects, especially those made of metal (walls, stairwells, filing cabinets) or containing large percentages Radio frequency (RF) energy is of water (fish tanks, stacks of Absorption (RF absorbed by material rather than paper, people, etc.). behavior) deflected or reflected. To avoid excessive absorption of the wireless signal, position the access point above any large objects in the area. An adjustment of the antennas may be necessary. An internetworking device that seamlessly connects wired and wireless networks. Access A device that provides wireless points combined with a Access Point (AP) clients with access to a wired distributed system support the network. creation of multiple radio cells that enable roaming throughout a facility. -- Default setting on Lexmark wireless network adapters. -- This will change to infrastructure during the configuration of the print server with an access point. -- Also known as peer-topeer, computer-to-printer, or computer-to-computer depending on the types of devices involved. Simple Definition Ad Hoc Mode A mode of operation for Wi-Fi networks in which devices communicate directly with each other. Term Simple Definition Advanced Definition -- A network composed solely of stations within mutual communication...

Words: 4427 - Pages: 18

Premium Essay

Wireless Technology and Communication in Healthcare

...Wireless Technology and Communication in Healthcare Biomedical Informatics Program Information Technologies in Medicine and Telehealth Course Instructor: Dr. Bronsburg Submitted by Rajesh Krishnan Written Assignment 1 You are the CIO of ACME Hospital in a rural underserved area. Your HCO recently received resources from a wealthy investor in the community to upgrade the hospitals communications system to a wireless platform. The boards of directors are not convinced this is a good thing, and have mixed feelings on what this will mean for the hospital. They all have cell phones but are unclear of the connection to medicine. Prepare a 4-6 page MS word document explaining to the board of directors what is wireless technology, how it works, its history, use in telemedicine, and what applications these technologies may be used for at the hospital setting. Read Chapter 1 to begin to answer these questions. What is wireless technology? Wireless technology is rapidly growing, and is playing an increasing role in people around the world in healthcare industry. Wireless is a term used to describe telecommunications in which electromagnetic waves instead of wires carry the signal over part or the entire communication pathway. The fourth generation cellular networks have greatly improved data transmission speed. In the meantime, short-range radio such as Bluetooth, Hiperlan, and infrared transmission are helping with wireless broadband multimedia and data communication in both...

Words: 2153 - Pages: 9

Premium Essay

Wireless Computer Research

...Meraki White Paper: Wire ess LAN Security Version 1.0, March 2009 Robust security is a requirement for many companies deploying a wireless network. However, creating a secure wireless network has often been difficult and time-consuming. This paper describes the security requirements for most companies and how Meraki can help them meet those challenges easily and at a low cost. Copyright © 2009 Meraki, Inc. All rights reserved. Trademarks Meraki® is a registered trademark of Meraki, Inc. www.meraki.com 660 Alabama St. San Francisco, California 94110 Phone: +1 415 632 5800 Fax: +1 415 632 5899 Table of Contents ( The Need For Sec rit" ###################################################################################################################### + ) What Doesn$t Work ######################################################################################################################### , * Recommended Sec rit" Architect res #############################################################################################- )!' Open with VPN !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! , )!( Shared Ke #WPA("PSK$ !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!! - )!) User Authentication #WPA("Enterprise$ !!!!!!!!!!!!...

Words: 2275 - Pages: 10

Premium Essay

Wireless Security Policy

...Wireless security policy for a medium-sized banking organization using the following structure: Wireless Security Policy - A wireless policy for a medium-sized banking organization will needed to deploy a wireless LAN to the network and there will not need an onsite IT. The remote can be manage by a standalone intelligent access point which will integrated the wireless LAN by streamline the configuration and management the system. The Network infrastructure wills us a Cisco system for Layer 2 and 3 switching, routing platforms, and voice over IP (VoIP) along with a security management. The Cisco Integrated Services Router will give all data a robust excellence quality for service, VPN, firewall, network security, and encryption for all medium sized origination with an intrusion detection that will address the business needed. To extend the value of the wireless LAN you can use a Cisco Wireless LAN Controller Module for the environments of a medium size origination. The mobility services that are enables by the robust which will include a guest network voice by the WLAN and location tracking. The Cisco 2800 or 3800 Series Integrated Services Router will give the medium size business faster upgrades with a streamline management and a greater reliability. It’s also have a backbone for infrastructure and deploy is cost effectively along with a secure WLANs management. This will give the medium size origination the greatest wireless system secure for the enterprise. Centralized...

Words: 467 - Pages: 2

Free Essay

Radio Frequency (Rf) Interference Analysis and Optimization

...Manager (Network Department) ADVANCED DATA NETWORKS SYSTEM LIMITED Red Crescent Concord Tower (19th floor) 17, Mohakhali Commercial Area, Dhaka-1212 Department of Electronics and Telecommunication Engineering DAFFODIL INTERNATIONAL UNIVERSITY October 2009 i APPROVAL PAGE This thesis titled „Radio Frequency (RF) Interference Analysis and Optimization‟, Submitted by Md. Rafiqul Islam, Md. Mohibul Hasan and Farhana Jahan to the Department of Electronics and Telecommunication Engineering, Daffodil International University, has been accepted as satisfactory for the partial fulfillment of the requirement for the degree of Bachelor of Science in Electronics and Telecommunication Engineering and approved as to its style and contents. The presentation was held on 19th October 2009. Board of Examiners Mr. Golam Mowla Choudhury Professor and Head Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Chairman) Dr. M. Lutfar Rahman Dean & Professor Faculty of Science and Information Technology Daffodil International University ---------------------(Member) A K M Fazlul Haque Assistant Professor Department of Electronics and Telecommunication Engineering Daffodil International University ---------------------(Internal) Dr. Subrata Kumer Aditya Professor Department of Applied Physics, Electronics and Communication Engineering University of Dhaka ---------------------(External) ii ABSTRACT Wireless Local Area...

Words: 18928 - Pages: 76