Free Essay

Wirless Network

In:

Submitted By zakarie
Words 1550
Pages 7
1- Write a detailed comparison between cabled network and wireless network.

The basic difference between a wired and a wireless network is self-explanatory. A wired network uses wires to communicate whereas a wireless network uses radio waves. let us look at what are the other differences and how one technology gets an edge over the other. * Wired networks are easy to set up and troubleshoot where wireless networks are comparatively difficult to set up, maintain, and troubleshoot. * Wired networks make you immobile while wireless ones provide you with convenience of movement. * Wired networks prove expensive when covering a large area because of the wiring and cabling while wireless networks do not involve this cost. * Wired networks have better transmission speeds than wireless ones. * In a wired network, a user does not have to share space with other users and thus gets dedicated speeds while in wireless networks, the same connection may be shared by multiple users.
Wired and Wireless networks are very common in the workplace as well as in the home. The wired Computer Networks provide a secure and faster means of connectivity but the need of mobility for example anywhere, anytime and anyone access is tilting the network users towards wireless technology. Wireless technology has high mobility. Technology has been created to store, transmit and receive data through networks at very high rates of speed. Users can now store detailed information at a very low cost. In the future, the speed of networks will increase as they have in past years. The cost of networks will continue to decline and using a network will be essential for every organization. As computing technology increases in power, and decreases in size, the price of creating a high-powered full featured network will decrease rapidly.

2- Describe the following terms related to Antennas

(a) Line of Sight

Line of sight (LoS) is a type of propagation that can transmit and receive data only where transmit and receive stations are in view of each other without any sort of an obstacle between them. FM radio, microwave and satellite transmission are examples of line-of-sight communication.
Long-distance data communication is more effective through wireless networks but geographical obstacles and the curvature of the earth bring limitations to line-of-sight transmission. However, these issues can generally be mitigated through planning, calculations and the use of additional technologies.
For example, mobile phones use a modified line-of-sight transmission, which is made possible through a combination of effects like diffraction, multipath reflection, local repeaters and rapid handoff.
(b) Fresnel Zone

The Fresnel zone is a three dimensional elliptic shaped region surrounding the line of sight path from the transmitter to the receiver. If a reflective object is placed anywhere on the edge of the ellipse, it will cause a reflected signal that, due to propagation delay, is delayed 180 degrees (in carrier phase) with the line of sight signal at the receiving antenna. If the Fresnel ellipse is cut perpendicular to the line of sight path anywhere along the line of sight path, a circle is formed with a radius known as the Fresnel radius. Note that Fresnel zones and Fresnel radius are frequency dependant because they are defined by the wavelength and propagation delay of the carrier.

(c) Antenna Gain

Antennas have a gain that is usually referenced to an isotropic source or a dipole.
The gain is referenced to the ratio of the power level out of the antenna of interest to one of the above reference antennas. Gain referenced to an isotropic source is expressed in dBi while gain referenced to a dipole is commonly expressed in dB. All antennas in this document have their gain expressed in dBi. Antennas have perfect reciprocity. The have the same characteristics whether used as a transmitting or receiving antenna. The gain is identical for both applications.
Gain is expressed as the ratio of the antenna power out (transmitting) or in (receiving) to the reference antenna power out or in. Assume a reference antenna is used to receive a signal from a transmitter. Then the antenna of interest is used.

(d) Intentional Radiator

international Radiator is a device that broadcasts radio energy (not infrared or ultrasonic energy) to perform its function. Intentional radiators are things like cell phones, CB radios, walkie-talkies, wireless connections, Bluetooth connections, and short range broadcast equipment, wireless key-access systems. These devices intentionally use the radio spectrum and therefore always require FCC equipment authorization.

(f) Equivalent Isotropically Radiated Power (EIRP)

is the apparent power transmitted towards the receiver, if it is assumed that the signal is radiated equally in all directions, such as as a spherical wave emanating from a point source; in other words, the arithmetic product of the power supplied to an antenna and its gain. Begin by testing the transmitter with a good dummy load and a good calibrated watt meter

3- Are wireless network a health hazard? Give proof to your findings.

A common concern about base station and local wireless network antennas relates to the possible long-term health effects that whole-body exposure to the RF signals may have. To date, the only health effect from RF fields identified in scientific reviews has been related to an increase in body temperature (> 1 °C) from exposure at very high field intensity found only in certain industrial facilities, such as RF heaters. The levels of RF exposure from base stations and wireless networks are so low that the temperature increases are insignificant and do not affect human health.
The strength of RF fields is greatest at its source, and diminishes quickly with distance. Access near base station antennas is restricted where RF signals may exceed international exposure limits. Recent surveys have indicated that RF exposures from base stations and wireless technologies in publicly accessible areas (including schools and hospitals) are normally thousands of times below international standards.
In fact, due to their lower frequency, at similar RF exposure levels, the body absorbs up to five times more of the signal from FM radio and television than from base stations. This is because the frequencies used in FM radio (around 100 MHz) and in TV broadcasting (around 300 to 400 MHz) are lower than those employed in mobile telephony (900 MHz and 1800 MHz) and because a person's height makes the body an efficient receiving antenna. Further, radio and television broadcast stations have been in operation for the past 50 or more years without any adverse health consequence being established.

While most radio technologies have used analog signals, modern wireless telecommunications are using digital transmissions. Detailed reviews conducted so far have not revealed any hazard specific to different RF modulations.

Cancer: Media or anecdotal reports of cancer clusters around mobile phone base stations have heightened public concern. It should be noted that geographically, cancers are unevenly distributed among any population. Given the widespread presence of base stations in the environment, it is expected that possible cancer clusters will occur near base stations merely by chance. Moreover, the reported cancers in these clusters are often a collection of different types of cancer with no common characteristics and hence unlikely to have a common cause.
Scientific evidence on the distribution of cancer in the population can be obtained through carefully planned and executed epidemiological studies. Over the past 15 years, studies examining a potential relationship between RF transmitters and cancer have been published. These studies have not provided evidence that RF exposure from the transmitters increases the risk of cancer. Likewise, long-term animal studies have not established an increased risk of cancer from exposure to RF fields, even at levels that are much higher than produced by base stations and wireless networks.

Other effects: Few studies have investigated general health effects in individuals exposed to RF fields from base stations. This is because of the difficulty in distinguishing possible health effects from the very low signals emitted by base stations from other higher strength RF signals in the environment. Most studies have focused on the RF exposures of mobile phone users. Human and animal studies examining brain wave patterns, cognition and behaviour after exposure to RF fields, such as those generated by mobile phones, have not identified adverse effects. RF exposures used in these studies were about 1000 times higher than those associated with general public exposure from base stations or wireless networks. No consistent evidence of altered sleep or cardiovascular function has been reported.
Some individuals have reported that they experience non-specific symptoms upon exposure to RF fields emitted from base stations and other EMF devices. As recognized in a recent WHO fact sheet "Electromagnetic Hypersensitivity", EMF has not been shown to cause such symptoms. Nonetheless, it is important to recognize the plight of people suffering from these symptoms.
From all evidence accumulated so far, no adverse short- or long-term health effects have been shown to occur from the RF signals produced by base stations. Since wireless networks produce generally lower RF signals than base stations, no adverse health effects are expected from exposure to them.

Conclusions
Considering the very low exposure levels and research results collected to date, there is no convincing scientific evidence that the weak RF signals from base stations and wireless networks cause adverse health effects.

Similar Documents

Premium Essay

Unit 4 Wirless Network Needs

...Unit 4 Research Wireless Network Communication Needs Sarah Simpson NT1210 Introduction to Networking Mrs. Abdule April 18, 2014 Wireless networks communicate much different than wired networks. For a wireless device to communicate in a wireless network it would need to connect to a mobile network. For example you have a device and you pay a mobile company to providing service for you to use it. To provide service, the mobile company installs tall radio towers with antennas extending off the top. This would support phone calls and text between phones within that mobile network. You speak into your phone and your voice is transferred into bits which are sent out as radio waves to the antenna which is sent to the Telco network as bits and then transferred to its correct destination. This is only the beginning; to allow devices to communicate with more phones than the just the ones within the same network or to connect to data services (google.com, facebook.com) you would need to connect to networks around the world. The process is similar to connecting mobile phones in the same network except instead of the radio towers antenna sending the bits to the Telco network it sends the bits to the internet. This is all capable because the mobile phones do not use copper or fiber cables to transmit bits they use wireless radio technology. Wireless LAN requires that every device connected to the network to have wireless NIC (network interface card). Wireless NIC’s do not need...

Words: 335 - Pages: 2

Premium Essay

Computer

...in researching   1) Developing a search strategy showed me how to organize my material and stay on topic. It also introduce me to key concepts which I have been using in my classes when studying and taking notes. Ironically I found using this method at work as well. Recently I found a solution to an ongoing network problem and my manager approached me asking me to fully research the resolution draft an email and send it out to the entire team.By using the search strategy I was able to gather the correct information that was needed to draft the email and send it to my team. 2)The Boolean operator AND OR NOT stuck in my head the most. I learned that this method is the main component to an effective statement and to broaden or narrow your search. When I use to search google without using the Boolean operator I always wondered why the search engine always gave me along list of searchs that didnt really relate to what I was looking up. By using this method I was able to get the exact results that I wanted and as I mention above this method was also used when I did my initial search statement for the email I sent to my colleagues on how to properly resolve the network issue. 3)Lastly the most important component of a research project is to cite the resources appropiately. In this course i was introduce to several styles of citing. There are different citing styles for different  documentation styles. I had to go back and really study this method thoroughly as suggested by...

Words: 337 - Pages: 2

Free Essay

There After

...How would one counter an active attack? b) Give examples of two possible scenarios when one cannot be absolutely certain that an adversary is launching a modification-of-message attack or denial-of-service attack, even when the proper security protections are in place. Explain your answer. c) How could traffic analysis jeopardize security? Give an example to illustrate your answer. Question 2 (a) Is it likely to achieve perfect security for a network (i.e. to have a network that will never fail in terms of security) in the real business world? Give three possible reasons to substantiate your answer. (b) The computing speed is much faster these days compared to that some years back. On the other hand, old algorithms and systems are still in use. Give three reasons to explain this situation. Question 3 a) (i) Explain Security Services and Security Mechanisms. (ii) Suppose the main threat of a network is replay attack. Does the use of confidentiality services protect the network against such attack? Explain your answer. (iii) Is it always the case that only one mechanism can be used to achieve the provision of a particular service? Give an example to illustrate and explain the answer. (b) Explain how the following services ensure security of the systems or of data transfers and give possible example or scenario for each: i) Message authentication ii) Non- repudiation iii) Confidentiality ...

Words: 284 - Pages: 2

Premium Essay

Harriet's Chocolate Factory

...Case Study 1: Harriet’s Fruit and Chocolate Company Daniel Michovich Dr. Otto CIS532: Network Architecture and Analysis January 26, 2013 Mission Statement: Striving to be number one fruit and chocolate industry area wide. Introduction “Harriet’s Fruit and Chocolate Company was established in 1935 in the Pacific Northwest of the United States to ship gift baskets of locally grown peaches and pears to customers in the United States (Oppenheimer, 2011)” In regards to the physical infrastructure of Harriet’s Fruit and Chocolate Company, my investigation will reveal many important aspects to aid in the planning of the network design. First, I will determine the number of buildings to be used, as well as the distance between them and what equipment they will contain such as wiring closets or computer rooms and the current network devices. Determining the distance will help in the cabling design and wiring as well as the selection of technologies and devices to meet the design goals. My investigation will further reveal any architectural or environmental constraints, such as tall trees within the path that power lines may travel, that will assist in decisions such as whether wireless technologies are feasible as well as if there are any impediments to communications or installation, to include all hazards. Infrastructure architecture consists of the hardware, software, and telecommunications equipment that, when...

Words: 1326 - Pages: 6

Free Essay

Ecss Practice Exams

...| | |The most damaging of the denial of service attacks can be a _______________ attacks, where an attacker uses zombie software distributed | |over several machines | | | | | |[pic] | |Bot | | | | | |[pic] | |Distributed denial of service ...

Words: 2882 - Pages: 12

Premium Essay

Ipremier Case Study

...customer an opportunity to decide if they want the products or not. iPremier Company iPremier is one of the top retail business that sell the luxury items, profiting $2.1 million on sales $32millions in 2006. Since then sale has grown over 20% annually. There was a decrease, but everything works itself out. Upper management describes working at iPremier as intense. .Qdata is the company that host iPremier computer equipment and provided connectivity to the internet (Austin and Murray, 2007). Although Qdata offers monitoring of website for customer and network operation, they had not invested in advanced technology and was not able to keep staff. During 75-minute attack how well did they iPremier perform. What would you have done differently if you was Bob Turley Bob Turley is new Chief Information Officer and is currently in New York on business. AT 4.31 am he received a call, from the network been hack and wired email received with just the word “Ha”. The site was a DoS attack coming from about 30 locations, the purpose of the attack was an attempt to make the computer unavailable. iPremier was not ready for such an attached and didn’t have anything in order which would help them with such an attacked. The situation was poorly handled, and Bob did not contact anyone higher up to let them know what was going on. He didn’t know who to contact, whether to call police or FBI or who to contact at...

Words: 967 - Pages: 4

Free Essay

Trending & Aggregation

... | |*Document Date: |[2013-05-20] | | T&A Handbook [pic] Update Notes |Date |Version |Description |Author | |2013-05-20 |V1 |T&A Handbook |Elham Kalantari | Contents 1 Introduction 3 2 T&A Interfaces 3 2-1 Source Availability 3 2-2 Dashboards 4 2-2-1 General Information 4 2-2-2 Over Time Mode 5 2-2-3 Over Network Elements Mode 9 2-2-4 Dashboards Contextual Menu 9 3 Examples 10 Introduction This document will guide you through the Trending&Aggregation (T&A) user interfaces. Some examples are available at the end. T& A Interfaces 2-1 Source Availability [pic] : This icon allows the visualization of source file availability. By clicking on it, below window appears. [pic] :...

Words: 1080 - Pages: 5

Premium Essay

Computer

...afford to spend and if anyone is technical in the company or are they going to need some outside help to keep up maintenance after the system is in place. (this can add to the cost of the system) My next step would be to start asking some questions about the law firm. I would like to know what the law firm is in charge of doing. Criminal, civil, family or so on; I think this would give me a better understanding of some of the information I may be working with along the way. As a law firm I am sure they spend a lot of time in the courtrooms and in their home offices so other questions I would ask is if they have cell phones and laptops that will need to access information on the network; this will help in a couple of areas, firstly in deciding if we should consider cloud computing or a private network and secondly, how to set up files access and permissions by departments and depending on size of company, maybe servers. Being a law firm a big consideration would have to be security of the information they access and ways of accessing this information. I would like to talk with the employees also, just to get an idea...

Words: 500 - Pages: 2

Free Essay

Paper

...Ruben Quinones IT245 - Introduction to Network Management Colorado Technical University Online Professor: Dr. Shawn P. Murray Phase 1 Individual Project Due January 13, 2013 Table of Contents Section 1: Target Organization - Identifying the Network 3 Section 2: Diagramming the Network - Network Architecture 4 Section 3: Network Models 5 Section 4: Network Protocols and Agents 6 Section 5: Network Security 7 Section 6: Network Management 8 References 9 Section 1: Target Organization - Identifying the Network * My organization is located in Pompano Beach, FL with a secondary warehouse location at Sunrise, FL. The company employs around 1,400 to 1,500 employees which 300-400 are computer and mobile device network user. * All of our users must use password protected sign on to access the network which gives access to our main software systems. * The company uses to Dell servers, one for back up and one for daily accessing. * The IT department consists of 5 employees; * IT manager – Supervises all IT technicians and Help desk operators. * Network I technician – overviews and maintains network protocols, ensures regular server maintenance is executed. * Network II Technician – gives back up to Network I and provides different analytical services to users. * Help desk technicians I and II – Executes more regular tasks, such as user maintenance, printer set up, workstation access and set up, and mobile devices...

Words: 269 - Pages: 2

Premium Essay

Case 2.1 Server Downtime

...TO: FROM: DATE: February 15, SUBJECT: Server Downtime Problem Statement: This report contains my findings and recommendations as a result of my research. This is a look into the server downtime and problems with the primary network servers here at Widget Company. First we will be looking into the numbers and statistical results I have found. Statistical Results: Based on the data I was given during the month of April the network experienced 5 different problems, they are lockups, memory errors, weekly virus scan, slow startup, and manual restart. The results of these issues are. 22 times the server was down 735 Minutes of total time server was down * * Of those 22 times the server was down the breakdown of how frequently each one occurred is as follows. * * * * This shows that memory errors were the most frequent reason the server was down. Memory errors were also responsible for the most time at 34% or 250 Minutes. What is interesting is that while there were only 4 times the server was down for its weekly virus scan it was responsible for about 33% or 240 minutes of the server downtime. * * * * Aside for the 4 planned weekly virus scans of 60 minutes each. The server was down 18 times for 495 Minutes. Memory errors contributed to over half of this downtime. Next we will take a look at my recommendations based on the data. * * Conclusion * * The server was down for a total of 735 Minutes during...

Words: 323 - Pages: 2

Premium Essay

Unit 8 Assignment 1

...institutions, and a number of private security firms — all working to study and combat data breaches. Analysis With 47,000+ Security incidents analyzed, 621 confirmed data breaches studied, and 19 international contributors, Verizon has ample amounts of data to compile and use to better their network. This data can also be analyzed to see what types of people are making these breaches and what motives they may have for doing so. In the 2013 DBIR, 69% of breaches were spotted by an external party and 76% of the network intrusions were due too weak or stolen passwords. Some of the other factors that have been realized was that 75% of the attacks are opportunistic and 19% of attacks are some form of espionage. There is also much evidence that many of these breaches could be tied to organized crime and gathering financial information. On a very basic level, just looking at the history of organized crime, money has always been in the center in one form or another. The money can be in the form of an exchange for a good or service, or it could be, knowing the financial information of someone for future business proposals or some other malicious intent. Recommendations - Tighter security on the networks. - Since some data breaches are done by resigned employees, instant account closing of all resources to...

Words: 344 - Pages: 2

Free Essay

Help

...encompass many components that focus on efficient and effective programs, providing services and benefits to the most vulnerable individuals in the state. One of Hawaii’s most profound agencies known in the State of Hawaii that is correlated with human services is “Helping Hands Hawaii.” Although there are many agencies that have different approaches, human services rely on agencies that are most cost-efficient yet effective. Interoperability plays a major role in the future of human services. It is the “ability of two or more systems to exchange information and to use the information that has been exchanged” (Schoech, 2010). The three possible models for approaching interoperability in the human services are Loosely Linked Network Model, Network Model, and Top-Down Model. Human services emphasize in the importance of interoperability, as agencies collaborate with the same identified need to help others. Helping Hands Helping Hands Hawai’i manages numerous programs that benefit the people of Hawaii; this includes Behavioral Health Programs, Ready to Learn, Emergency Assistance Program and many more. Their mission is to support the community by improving the quality of people’s lives through the delivery of goods and services to those who are in need. For families and individuals, Helping Hands Hawaii is a new quality of life that overcomes the obstacles that block the way of meeting their full potential. This non-profit organization revenue from State agencies, grants...

Words: 869 - Pages: 4

Premium Essay

Aljazeera

...Content: The page complete and functioning very well, all the aliments of the page are ready to be used as soon as entering the website, the content is included in each link in the page. The title of the page is Aljazeera and the logo of the network is at the left side of the word, it's noticeable because it's written in a big font size and a special font style. A big network like Aljazeera need for sure to be updated frequently add on the argent news happening must be included in the website, the website has allot of parts and each part talks about a special kind of news for example the wither, sports, and watch live, those areas are a sensitive information's and must be updated as soon as an information is received to the network responsible employees, looking at the website Aljazeera didn’t miss that point at all, the information's are being updated frequently. At first the audience of Aljazeera was just Arab world, but at November 2006 Aljazeera English has been lunched the target audience after that is all the world with its deferent Taste and backgrounds Aljazeera nowadays gives almost all the news that each one around the world would need, it's almost nothing there you are not interested in. Aljazeera has no any obvious bias or slant to the information it has been always with the truth and human rights and it's taking it as a lead to its perfection, actually Aljazeera has an awards proofing that, and it's giving both sides Opinions which is fair enough. There are allot...

Words: 357 - Pages: 2

Premium Essay

Microsoft Server 1 Lab 6.1

...available in the system stability report selection? Software unitalls, application failure, hardware failure, windows and miscellaneous 7.Waht logs are available by default? Application,security,setup,system and forward event 8.What is most recent Event id logged to the Application log? Application,security,setup,system,forward events 9.What is the most recent Event ID logged to security log? 4634 10.What is most recent event id logged to setup log? 1610 11. What is most recent event id logged to system log? 7036 12.How many events are displayed in this custom view? 52 13.What is the keyboard shortcut to begin a network capture? F5 14.What appears in the Capture Filter pane? 15.Does anything appear in the Network Conversations pane? no 16.Does anything appear in the Network Conversations pane? All traffic,my traffic, 17.Where will WSUS downloads be stored by default? (c:/wsus) 18.What database does WSUS use by Default? MSDE 19.What types of updates does WSUS download by default? Automatic updates 20.What nodes are available under the W2K40 node?...

Words: 260 - Pages: 2

Free Essay

Syllabus

...it is both my hope and expectation that you will complete this course with an understanding of network design and management.For me networking started with me completing my Bachelor of Science in Electronic Engineering Technology in 1988. I then went on to complete a Master of Science in Computer Science, from Illinois Institute of Technology in 1992.  In 2011, I completed my doctoral studies at Georgia State University. From about 1988 – Present, I have worked for various Telecommunication companies, such as, AT&T Bell Labs, Tellabs, Nortel, and Cisco Systems.  My most enjoyable position was designing fiber optic networks for many of the top tier ISP/Service Providers today.I love to play tennis; I wish that I could play tennis for a living. I play in KSWISS Men’s Single League, T2 Tennis, Peach Tennis and tournaments. I also love running at least three times a week. The other activities I enjoy, working on my computer, playing with my dog and enjoying the beautiful outdoors.If you every need to contact me, please give me a call or email me. We can setup a time that is convenient.  Please remember, I am here to help you not only complete the course, but also to be sure that you can master the concepts and skills that the course offers.  My contact information is listed in the syllabus. Thanks, Dr. Wright |   | Print This Page |   | | Course Text |   | Top-Down Network Design 3rd Edition by Priscilla Oppenheimer © 2011 Cisco Press | First Time Using VitalSource...

Words: 3071 - Pages: 13