Nobody downloaded yet

Wireless Ethernet - Term Paper Example

Comments (0) Cite this document
The paper “Wireless Ethernet” discusses the IEEE 802.11 wireless Ethernet standard and its later iterations. The history of the technology is explored, taking off from traditional wired Ethernet, and discussing the similarities and differences of wireless Ethernet from traditional wired Ethernet. …
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Wireless Ethernet
Read TextPreview

Extract of sample "Wireless Ethernet"

Download file to see previous pages From there the paper discusses the wireless Ethernet standard as it relates to the physical layer, the data link layer, and the application layer of the OSI stack (6test; Defoenet). The general applications of the technology are then discussed, followed by an exploration of the future and the expected future developments in related technologies to wireless Ethernet 

Wireless Ethernet is the designation for technology that is officially termed as Wireless LAN or WLAN. In the literature, this corresponds to the IEEE 802.11 standard. WLANs lend themselves to being a standard that has substantial overlaps in similarity with the Ethernet standard, for LANs, including that systems that fall under the WLAN 802.11 standards can be plugged into traditional Ethernet LANs with great ease. Moreover, such 802.11 standards LANs lend themselves to quick translations between the IEEE 802.11 wireless standard and IEEE 802.3 Ethernet standards. This is the reason why the 802.11 standards are also referred to in the scholarly literature as Wireless Ethernet. Wireless Ethernet is the common designation term for the WLAN 802.11 standard (Lin 1-4; Kopp)

The similarities between traditional Ethernet and wireless Ethernet translate to similarities in the physical and logical topologies of the two, further strengthening the historical roots of Wireless Ethernet as the informal designation of what is officially known as WLAN under the 802.11 standard. In the Wireless Ethernet standard, the network hub also forms the part of the center of the network, and this is a wireless radio transmission point that beams the data signals to the rest of the network. This is known as the central wireless Access point or AP. Physically, wireless Ethernet networks are star topologies, while logically the topology is that of the bus topology.   ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(Wireless Ethernet Term Paper Example | Topics and Well Written Essays - 2000 words, n.d.)
Wireless Ethernet Term Paper Example | Topics and Well Written Essays - 2000 words. Retrieved from
(Wireless Ethernet Term Paper Example | Topics and Well Written Essays - 2000 Words)
Wireless Ethernet Term Paper Example | Topics and Well Written Essays - 2000 Words.
“Wireless Ethernet Term Paper Example | Topics and Well Written Essays - 2000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document


Wireless security

...and secure than before. Categories of Wireless Security Protection There are three main categories of wireless security protection, which include access control, wired equivalent privacy, and authentication. All of these serve the purpose of protecting the networks from unauthorized outside accesses. Of all these three types of protections, the one, which I feel more secure than the others, is access control. Smith (n.d.) states, “Access control systems are physical or electronic systems which are designed to control who has access to a network”. It is basically a process in which administrator of a network grants or denies the resources to access the network based on the authentication of the person who...
2 Pages(500 words)Essay

The Ethernet Technology Report

... Ethernet Introduction Introduced in 1980, Ethernet is presently the most widely used LAN technology that defines the cabling and signaling specification for the physical and data link layer of the OSI model. It refers to the protocols defined by the underlying data rates (10 Mbps, 100 Mbps, 1 Gbps or 10 Gbps), the physical medium (thick/thin coaxial cable, twisted pair or fiber-optic cables), running different signaling methods (Manchester, 4B/5B, 8B/10B) providing an access method for the shared medium Carrier Sense Multiple Access with Collision Detection (CSMA/CD). Ethernet provides an inexpensive, high-performance networking environment where all types of computer devices can be...
4 Pages(1000 words)Essay

Wireless Security

...into various types of network technology. The IEEE 802.3 was one of the most famous standards developed, which set stipulations for Ethernet local area network technology. In 1990, a committee was formed to come up with a standard for WLANs that would operate at a speed of one and 2Mbps. A number of different proposals were recommended before a draft that went through seven different revisions was developed. In 1997, the IEEE approved and adopted the IEEE 802.11 standard. This was the first WLAN standard which defines the physical (PHY) and the media access control (MAC) layers for a LAN that is wireless connected. It deals with local area networking where the associated devices communicate via air to...
7 Pages(1750 words)Research Paper

Advantages and Disadvantages of Power over Ethernet

...Integrating power over Ethernet into the network designs eradicates the constraint of having the outlets of AC power. As a result of this, the flexibility of placing such network equipment enabled by power over Ethernet as VoIP phones, IP cameras, and the wireless access points in the locations of choice rather than the locations with power supply is increased. Using the power over Ethernet, organizations can place the networking devices optimally so that the efficiency of network designs can be enhanced and the performance of application can be improved. Using power over Ethernet, equipment can be easily placed on the ceilings, walls, as well as...
3 Pages(750 words)Essay

Wireless management

...itself. The second step in the key renegotiation process involves the generation of session keys used for encrypting traffic. PMKs are the root keys used for this step. If a PMK is compromised, then the confidentiality of the entire session is suspect since deriving session keys, given the PMK, is a simple process. (802.11i) 802.11b extends the original 802.11 standard, which included specifications for 1- and 2-Mbps wireless Ethernet transmissions using spread spectrum RF signals in the 2.4-GHz Industrial, Scientific, and Medical (ISM) band. The transmissions use 100 milliwatts (mw) of transmitter power in North America (and less in other parts of the world). In the original standard, two...
5 Pages(1250 words)Essay

Wireless networking be networked. (Mitchell, 2009, p.1) Wireless routers will have an internal firewall to protect the computers from the hackers or intruders. These wireless routers may have some LED lights in the front in order to indicate different functions, connecting ports at the back and a built in antenna Wireless access points Wireless access points (WAP) connect the wireless computers to the wired Ethernet. It can be connected to another access point or to the internet. WAP's can accommodate large number of computers. An access point can typically connect up to 255 computers and by establishing connection between different access points,...
5 Pages(1250 words)Essay

Wireless Technology

...Running head: WIRELESS TECHNOLOGY Wireless Technology 21 December Wireless technologies are becoming commonplace. Millions of businesses and individuals use the benefits of wireless technologies to raise their efficiency, productivity, and speed up their decision-making processes. This paper provides a brief insight into the wireless standards that could convince a business owner to adopt wireless technology. The link between wireless technology and productivity is discussed. The paper evaluates positions and employees that could make best use of wireless technology. The benefits of...
2 Pages(500 words)Essay


...A site survey begins with the physical layer, identifying whether access to the internet exists, and the location of devices needing access. Wired access to the internet is necessary whether that is through a T1 line or a cable modem. In a residence, it comes into the house as an Ethernet hub offering up DSL, along with cable television for instance. The cost for high-speed residential DSL, bundled with a phone line from AT&T runs about $60 a month, with no cable television reception. A wireless router is then connected to the wired connection, which then creates the data layer, such as TCP, so that an IP address can be assigned. Each device on the network must also have a wireless...
1 Pages(250 words)Essay


...up a network system. These physical media are the most reliable for message sending, and they do provide faster data communication through high speed transfer of signals over long distances. Examples include coaxial cable, twisted pair cable and the fiber optic. The unbound media literally use the wireless connections and the transmission done via electronic waves (Odom W., Healy R., and Donohue D., 2010). Data Communication Protocols are a combination of both hardware and software standards that are established to effectively govern data transmission between computers. I.e., TCP/IP is a collection of different communication protocols based on IP and TCP. The TCP (Transmission Control Protocols) is applied in the...
1 Pages(250 words)Research Paper


...The modern digital communication is largely performed on the wireless medium. The wireless medium provides large number of benefits and facilities as compared to the previous technology of wired medium. Despite the large number of benefits achievement, there are areas where the wireless medium lags behind the conventional form of wired medium interface operations. Advantages of wireless medium: The first and foremost advantage that is provided by the wireless interface is the non reliance on the wired medium. In other words, the element of mobility and portability has been made possible through the wireless communication setup. On the go...
2 Pages(500 words)Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Term Paper on topic Wireless Ethernet for FREE!

Contact Us