StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Wireless technology and its impact on computer networking - Essay Example

Cite this document
Summary
In the beginning of the last century, the particular timeline was referred to as the 'Industrial Age'. True to an extent, as that era saw the emergence of a new kind of advancement for the betterment of mankind…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Wireless technology and its impact on computer networking
Read Text Preview

Extract of sample "Wireless technology and its impact on computer networking"

Wireless Technology and its Impact on Computer Networking In the beginning of the last century, the particular timeline was referred to as the 'Industrial Age'. True to an extent, as that era saw the emergence of a new kind of advancement for the betterment of mankind. Three quarters of a century later, civilization witnessed the birth of a new era, one which was largely ahead of its predecessor in terms of technological advancements. This new era as we all know it is the age of information technology. One need not go into the depth and the history of this achievement but move on towards a more current realization, the accomplishment which is more conveniently termed as an industry due to its sheer magnitude and relative importance. According to Kaveh Pahalavan and Prashan Krishnamurthy, "it owns the largest market share, and it has enabled us to change our lifestyles by entering the information technology age. This industry is the telecommunication networking industry". "Wireless networking has exploded in popularity in the last few years. From the way we communicate with friends and family to the way we conduct our daily business, and even the way we listen to music, wireless networking is quickly changing the face of technology" (Magoo). The impact of wireless networking or WiFi (wireless fidelity) on the existing computer networking has been rather drastic. And the number of benefactors are countless, educational and business institutions are just a few to name. It is the birth of a new dynasty, the new generation of telecommunications. The WiFi system provides support to countless devices for connection, may it be laptops, cell phones, PDAs etc. Wi-Fi or Wireless Local Area Network (WLAN) is based on the IEEE 802.11 specifications. "IEEE 802.11, the Wi-Fi standard, denotes a set of Wireless LAN/WLAN standards developed by working group 11 of the IEEE LAN/MAN Standards Committee (IEEE 802)" (Wikipedia). A typical Wi-Fi setup involves setting up access points which as the term suggests are geographical areas where internet can be access via a router. A wireless network is a very complex structure and has evolved over the past decade. Some light needs to be shed on the entire architecture of a wireless network. In that respect, an important reference point is the OSI model. "The OSI, or Open System Interconnection, model defines a networking framework for implementing protocols in seven layers" (Webopedia). The seven layers are defined as Application (Layer 7), Presentation (Layer 6), Session (Layer 5), Transport (Layer 4), Network (Layer 3), Data Link (layer 2), and Physical (Layer 1). In the OSI model, control is passed on from the top layers to the bottom, one-by-one and back up. For example, an information exchange between two users will go in such way that 'user 1' will send data from one terminal. The data will transmit via all the layers starting from the application layer down to the physical layer. There will be a physical link between the physical layers of both users. The data will be transmitted to the physical layer of 'user 2' via a physical link. Once there, it will be passed on the hierarchy up to the application layer where it will be received by the user. One common misconception has to be clarified that the user is not a part of the OSI model. "The OSI serves as a reference model for all network protocols because its functionality exists in all communications systems, although two or three OSI layers may be incorporated into one" (TechWeb). The OSI model is an important aspect in the entire architecture on which serves as the basis of networking. All network communication taking place between two devices is based on all or some layers (TCP/IP) of the OSI Model. Using this definition on the original topic, it can be deduced that OSI model is a networking standard and wireless networking is a part of it. When it comes to wireless networking, the OSI model alone is not responsible for data transmission. It requires support from a rather condensed version of itself, the DOD networking model. "The DoD model Department of Defense) is a layered abstract description for communications and computer network protocol design. It was created in the 1970s by DARPA for use in developing the Internet's protocols, and the structure of the Internet is still closely reflected by the DoD model" (Answers). The DoD model has four layers as compared to OSI which has seven. The four layers from top-to-bottom are the 'Network Access Layer', which delivers the data over the existing hardware. The 'Internet Layer' which delivers data over different physical networks which are interconnected. The 'Host-to-Host Layer' which manages the flow of data in all aspects and situations for example, retrieval and transmission of lost data. And finally the 'Process Layer' which controls the functions defined by the user. The DoD model is an enhancement of the OSI model and combined together they provide the medium for information exchange over a wireless network. The DoD model can be used for both wired and wireless networking. It works on the same basis and supports data transmission along with the OSI model. Wireless networks are considered to be highly convenient and feasible in terms of mobility as opposed to the high data transfer speed, which is one main advantage of wired networks. There are various advantages of a wireless networks with respect to mobility and convenient network access. A wireless network is rather easy to set up as compared to wired networks. It allows LANs to operate smoothly without the hassle of laying down network cables and monitoring and maintaining them. Since its common sense that one access point can only cover a particular geographic area. So in big buildings etc, multiple access points have to be created. In terms of mobility Wi-Fi supports roaming in between two or more access points hence not breaking the internet link with the server. But at the same time, there are various disadvantages and security risks concerned with wireless networking. Security and data integrity are one of the biggest concerns linked with Wi-Fi. Since the domain is wide spread, the access to the network cannot be limited or completely monitored. In a wired network, access can be limited via physical means but in a huge geographical region it's not completely possible to limit access. For example a Wi-Fi network in a home can be accessed by trespassers or outsiders and data integrity can be compromised. Firewalls and other security measures can be used and they are effective to a large extent but network security still remains as a key issue in wireless networking. Another major disadvantage of a wireless network is the variation of data transfer speed when compared to a wired network. The data transfer speed is the one aspect which most affected by the lack of cabling. And it is also affected by other factors, for example a bad signal which leads to inconsistency of data transmission. Since the signal is spread via radio waves, physical factors such as thick walls can be a major cause of the degrading of data in a wire less network. Radio interference can also cause the network and affect the transfer speed. Works Cited DoD Model." Answers.com. http://www.answers.com/topic/dod-model Accessed 23 May, 2006 DoD Networking Model." Connected: An Internet Encyclopedia. http://www.freesoft.org/CIE/Course/Section1/5.htm Accessed 23 May, 2006 Guide to Wireless Networking." Magoo's Ultimate Guide to Wireless Networking. http://guides.radified.com/magoo/guides/wireless/wireless_networking_01.htm Accessed 23 May, 2006 . IEEE 802.11." Wikipedia http://en.wikipedia.org/wiki/IEEE_802.11 Accessed 23 May, 2006 OSI Model." TechWeb: TechEncyclopedia http://www.techweb.com/encyclopedia Accessed 23 May, 2006 Pahlavan, Kaveh, and Prashant Krishnamurthy. Principles of Wireless Networks. 1st ed. Singapore: Pearson Education, 2003. The 7 layers of the OSI Model." Webopedia http://www.webopedia.com Accessed 23 May, 2006 Computer Networks and Internet http://www.netbook.cs.purdue.edu/ Accessed 23 May, 2006 Wireless: Tutorial Reports.com http://www.tutorial-reports.com/wireless/ Accessed 23 May, 2006 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Wireless technology and its impact on computer networking Essay”, n.d.)
Retrieved from https://studentshare.org/information-technology/1523179-wireless-technology-and-its-impact-on-computer-networking
(Wireless Technology and Its Impact on Computer Networking Essay)
https://studentshare.org/information-technology/1523179-wireless-technology-and-its-impact-on-computer-networking.
“Wireless Technology and Its Impact on Computer Networking Essay”, n.d. https://studentshare.org/information-technology/1523179-wireless-technology-and-its-impact-on-computer-networking.
  • Cited: 0 times

CHECK THESE SAMPLES OF Wireless technology and its impact on computer networking

Future of Comuper Networking

Despite of all the versatility the networking possesses today, it is unskeptical to think about the limitations of networking in the future.... The current central theme of notion is upon the elaboration of client server communications in which the role of Information Technology writ to a great extent creating the need for the advancement of networking technologies for a better tomorrow. … Today's most important and considerable issue regarding communicational approach refers to the need of protocol enhancement from IP to Ipv6....
3 Pages (750 words) Essay

Networking and Management

In computer networking, the integrated services (IntServ) architecture is an architecture that specifies the elements for the guaranteeing of quality of service (QoS) on the network.... The paper "networking and Management" tells us about computer networks.... hellip; A computer network can also be seen as a collection of Personal computers and other related devices which are connected, either with cables or wirelessly, so that they can share information and communicate with one another....
16 Pages (4000 words) Essay

WiMax - Technology for Tomorrow

he latest step in wireless computer networking, WiMax has the capability of covering an area having a radius of 30miles, which represents the size of a fairly large metropolis, and that is why... It also provides an assessment of the penetration and use of ICT in the GCC at present, and identifies the major constraints to rapid deployment of the use of this technology and suggests the ways in which these problems may be addressed in the immediate future.... A non profit organisation 'The WiMax Forum' was formed and nearly all companies that are into wireless technology are members, this forum targeted to provide standards and commercialise this technology....
9 Pages (2250 words) Essay

Setting up a Home Network

Telephone technology, microwave transmission, and satellites can also be used where the distance between the LAN networks is far.... They can also be connected by wireless.... In the case of a wireless LAN, the workstation and file servers are connected using radio signals, infrared light beams, or even lasers.... There are two most commonly used infrared technologies in the case of wireless LAN.... These problems lead to the slow down of the wireless network....
10 Pages (2500 words) Essay

Wireless Networks-WLAN's

nhanced return on investment: According to a popular NOP study, it has been found that the use of wireless networking has had a huge impact on industries in terms of the return on investment.... In the current section, the concept of wireless networking and the various trends associated with it shall be discussed in close detail.... … As the name suggests, wireless networking is different from wired networking wherein the use of wires for the purpose of communication is totally eliminated....
23 Pages (5750 words) Essay

Wireless compatibility with information systems

Operating systems impact the way the network's physical media is accessed (the air interface) and the way client applications communicate with servers (protocols).... Current versions of TCP assume a reliable high rate link and therefore its congestion control algorithms are tuned to handle traffic driven congestion.... UMTS, a GSM and CDMA successor, is a 3G technology whose development is carried through into 4G, relies on W-CDMA and supports up to 21 Mbps with HSDPA....
3 Pages (750 words) Essay

How Bluetooth Works

Bluetooth networking technology transfers data using low power radio waves.... For instance in the case of a personal computer they can be inbuilt as a PC card or attached externally through the USB port.... Bluetooth technology signals pass through walls, doors, windows and it can reach many wireless devices connected to it provided they are on its way of travel.... Bluetooth technology can also be used with… ersonal computers, printers, telephones, laptops, GPS receivers, video game consoles and digital cameras including others for different practical operations as noted by Minoli (307). Originally, Bluetooth was used in linking headsets to a mobile phone....
5 Pages (1250 words) Term Paper

Wi-Fi Protected Setup Vulnerabilities

hellip; These flaws hinder the intended use of WPS and its acceptance3 among computer users.... It would then be replaced by Wi-Fi protected access (WPA2) which just like WEP was developed to provide security for computer users operating through a private wireless network (Bosworth 2012, p.... This meant that it was impossible to guarantee the protection of information on one's computer through a private wireless connection.... WPS is designed to provide various methods through which a computer user can authenticate his or her wireless network connection (Stajano et al 2007, p....
6 Pages (1500 words) Literature review
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us