Wireless access - computer network, Computer Networking

Assignment Help:

Wireless Access

Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless and (2) wide  area wireless. In a wireless LAN wireless users transmit  receive packets to form a base station ( also  known  as a wireless access point)  within a read us of a few tens of meters. The base station is typically  connected to the  wired internet and thus serves to connect wireless users  to the wired  networks. In wide area wireless  access networks the base stations is  managed by a telecommunications  provider and serves users within  a radius of  tens of kilometres.

Wireless LAN are based on IEEE 802.11 technology ( also  knows  as wireless Ethernet and wi fi) are currently enjoying rapid  deployment in  university departments business offices, coffee cafes and homes. Using  this wireless LAN infrastructure students  send  and receive e mail or surf the web  from anywhere in campus ( for example  library dorm  room  classroom  or outdoor  campus bench.

Today  many  residences are combining  to broadband residential access with inexpensive wireless  LAN technology (cable  modern or DSL) with inexpensive wireless LAN technology  to create powerful  home  networks. This home  networks  consists  of a roaming laptop as  well as  three  stationary  PC ( two  wired one wireless) a base station  ( the  wireless access point) which communicates  with the  wireless  PCs  a cable  modern providing  broad  band  access to the internet and a router which  interconnects the base  station and the stationary PC with the cable  modern. This  networks allows  the residents  to having broadband internet access, if  one member roaming form  the kitchen to the backyard or to the bedroom.

When one  access the internet through wireless LAN technology one has typically  need to be within  a few  tens  of meters from  the base station. This is feasible  for home access coffee shop  access and  more generally access within  and around  a building.

 


Related Discussions:- Wireless access - computer network

Introduction-pram algorithms, One of the most popular models for designing ...

One of the most popular models for designing parallel algorithms is PRAM (Parallel Random Access Machine). A PRAM consists of unbounded number of processors interrelating with each

sorting circuit along with odd-even merging circuit, As we previously know...

As we previously know, the merge sort algorithm needs two circuits, i.e. one for merging and second for sorting the sequences. Thus, the sorting circuit has been derived from the a

Briefly describe about cryptography, Question 1 Describe any five differen...

Question 1 Describe any five different types of computers Question 2 Explain Bus Type LAN. Its advantages and disadvantages and examples Question 3 Explain the s

Topology, bus topology disadvantage?

bus topology disadvantage?

Explain torus interconnection networks, Torus: The mesh network with wrap ...

Torus: The mesh network with wrap around connections is termed as Tours Network. Figure: Torus network

Describe about the term- network, Describe about the term- network If n...

Describe about the term- network If network tends to lose the packets, it is better to acknowledge each one of them separately, so the lost packets could be retransmitted. On t

Describe networking, Describe networking. Networking refers to the inte...

Describe networking. Networking refers to the inter connection among computers and peripherals for data communication. Networking can be done using wired cabling or by wireless

Dns id hacking - domain name server, DNS ID hacking The Dns use ID sys...

DNS ID hacking The Dns use ID system in order to keep track of each every request and replies. In order to spoof the DNS’s response, the hacker needs to do ID Hacking. In orde

Network service model - network layer and routing, Network Service Model ...

Network Service Model The network  service  model  defines  the characteristics of end to end  transport of data between  one edge of the  network  to the  other  that is betwe

Error correcting code - hamming code, Error Correcting Code - Hamming Code:...

Error Correcting Code - Hamming Code: Hamming code is the one of the error-correcting code named after its inventor. Because of the simplicity of the hamming code, it can dete

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd