802.11 wireless lans and csma/ca, Computer Network Security

Assignment Help:

 

802.11 WIRELESS LANs AND CSMA/CA:

 IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data rate of 2Mbps and 900MHz. Bluetooth specifies a wireless LAN for short places. It needs shared medium and radio signals instead of coaxial cable.

LIMITED CONNECTIVITY WITH WIRELESS:

 In contrast with wired LANs, not all methods can be able to reach each other.Because:

  • It has low signal power.
  • In wireless LANs the propagation is stopped by walls etc.
  • It can't relay on CD to avoid interference because not all participants can hear.

This is given in the figure below:

 

1546_802.11 WIRELESS LANs AND CSMA.png


Related Discussions:- 802.11 wireless lans and csma/ca

Packet sniffers, PACKET SNIFFERS A packet network protocol analyzer is a...

PACKET SNIFFERS A packet network protocol analyzer is a network tool which collects copies of packets from network and analyzes them. It can give network administrator with valu

Security and basics steps in writing thesis, how can i start thesis? Please...

how can i start thesis? Please mention so of examples?

Sending an arp message, Normal 0 false false false EN-U...

Normal 0 false false false EN-US X-NONE X-NONE

Explain quality management system, Question: Quality management standar...

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

Explain the main stages in the penetration testing process, Question: (...

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Star topology, STAR TOPOLOGY In this topology, all devices are attache...

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

What is the major security flaw of set, QUESTION (a) Discuss why it is ...

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Quote, How much would it cost to have a project completed by tomorrow night...

How much would it cost to have a project completed by tomorrow night?

Mastering the complexity of network system, To master the complexity one mu...

To master the complexity one must apply the given points. CONCENTRATE IN UNDERSTANDING THE CONCEPTS: Instead of details of wires used to connect computers to a specif

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd