802.11 wireless lans and csma/ca, Computer Network Security

Assignment Help:

 

802.11 WIRELESS LANs AND CSMA/CA:

 IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data rate of 2Mbps and 900MHz. Bluetooth specifies a wireless LAN for short places. It needs shared medium and radio signals instead of coaxial cable.

LIMITED CONNECTIVITY WITH WIRELESS:

 In contrast with wired LANs, not all methods can be able to reach each other.Because:

  • It has low signal power.
  • In wireless LANs the propagation is stopped by walls etc.
  • It can't relay on CD to avoid interference because not all participants can hear.

This is given in the figure below:

 

1546_802.11 WIRELESS LANs AND CSMA.png


Related Discussions:- 802.11 wireless lans and csma/ca

Major difference between a virus and a worm, Question: (a) State wheth...

Question: (a) State whether the following statements are TRUE or FALSE. Justify your answer. i. A good site security policy will require that users use computer generated p

Gateways, Gateways They transfer packets among network machines that h...

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

Tracing a route, There is another probing methods i-e Trace Route. To get m...

There is another probing methods i-e Trace Route. To get more detail it is used     As given in the figure about the route to DANDELION-PATCH.MIT.EDU was looked out a

What is border gateway protocol, Border Gateway Protocol It is a proto...

Border Gateway Protocol It is a protocol needed to advertise the set of networks that can be achieved within an autonomous machine. BGP activates this information to be shared

Project, project on ensuring data securities on cloud computing

project on ensuring data securities on cloud computing

Project, Network diagram for a mediacal care

Network diagram for a mediacal care

Explain the security service - confidentiality, Question: (a) Explain t...

Question: (a) Explain the following security services: Confidentiality, Availability. (b) Which attack will be used to bypass even the best physical and logical security m

Calculate the dynamic range of the 16-bit scanner, You are hired as a consu...

You are hired as a consultant to help design a digital library in which books are scanned and stored digitally and made available to users of the World Wide Web. Assume that the li

What is the role of an intrusion detection system, Problem: (a) What i...

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

Securities Issues in a company, 'Near Field Communication' (NFC) technologi...

'Near Field Communication' (NFC) technologies are expected to become commonplace in the near future. Some relevant features are these: A suitable device (such as a mobile pho

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd