Wireless access - computer network, Computer Networking

Assignment Help:

Wireless Access

Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless and (2) wide  area wireless. In a wireless LAN wireless users transmit  receive packets to form a base station ( also  known  as a wireless access point)  within a read us of a few tens of meters. The base station is typically  connected to the  wired internet and thus serves to connect wireless users  to the wired  networks. In wide area wireless  access networks the base stations is  managed by a telecommunications  provider and serves users within  a radius of  tens of kilometres.

Wireless LAN are based on IEEE 802.11 technology ( also  knows  as wireless Ethernet and wi fi) are currently enjoying rapid  deployment in  university departments business offices, coffee cafes and homes. Using  this wireless LAN infrastructure students  send  and receive e mail or surf the web  from anywhere in campus ( for example  library dorm  room  classroom  or outdoor  campus bench.

Today  many  residences are combining  to broadband residential access with inexpensive wireless  LAN technology (cable  modern or DSL) with inexpensive wireless LAN technology  to create powerful  home  networks. This home  networks  consists  of a roaming laptop as  well as  three  stationary  PC ( two  wired one wireless) a base station  ( the  wireless access point) which communicates  with the  wireless  PCs  a cable  modern providing  broad  band  access to the internet and a router which  interconnects the base  station and the stationary PC with the cable  modern. This  networks allows  the residents  to having broadband internet access, if  one member roaming form  the kitchen to the backyard or to the bedroom.

When one  access the internet through wireless LAN technology one has typically  need to be within  a few  tens  of meters from  the base station. This is feasible  for home access coffee shop  access and  more generally access within  and around  a building.

 


Related Discussions:- Wireless access - computer network

Write the definition of SAN, Write the definition of SAN A SAN is a sep...

Write the definition of SAN A SAN is a separate network to handle storage requirements. The SAN detaches storage tasks from specific servers and makes a shared storage facility

Path layer - sonet sdh , Path Layer The path  layer maps services  such...

Path Layer The path  layer maps services  such as DS3, FDDI, and ATM into the SONET  payload formal. This layer  provides  end to end  communications  signals  labelling path m

Cost involved in inter-processor communication, Cost Involved in Inter-Proc...

Cost Involved in Inter-Processor Communication As the data is assigned to many processors in a parallel computer while implementing a parallel algorithm, the processors might

Explain the process of piggybacking, Q. Explain the process of piggybacking...

Q. Explain the process of piggybacking? When a data frame arrives in its place of immediately sending a separate control frame and the receiver restrains itself and waits until

Power supply system in satellite system, POWER SUPPLY SYSTEM IN  SATELLITE...

POWER SUPPLY SYSTEM IN  SATELLITE SYSTEM Satellite Earth Station relies on the public power supply system. Two generators (1+1) of 250 KVA each in parallel connection having fa

How l2f establishes the tunnel, Can you describe the broader steps of how L...

Can you describe the broader steps of how L2F establishes the tunnel?

Packet cost - network layer and routing , Packet  Cost Both  distance ...

Packet  Cost Both  distance vector and link  state  routing  are lowest  algorithms. Tow factors  govern  how  cost is applied to packets  in determines  a route. Cost  is a

Name the 10base5 connectors, 10Base5 Connectors Transceiver - inter...

10Base5 Connectors Transceiver - intermediary device as well called a medium attachment unit (MAU) Performs CSMA/CD function may perhaps contain small buffer Atta

Components of the vpn - point to point , Components of the VPN When  us...

Components of the VPN When  using  VPN we incorporate many pieces of a jigsaw puzzle each piece services its own  function to private  the interoperation and the  security  nec

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd