Wireless access - computer network, Computer Networking

Assignment Help:

Wireless Access

Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless and (2) wide  area wireless. In a wireless LAN wireless users transmit  receive packets to form a base station ( also  known  as a wireless access point)  within a read us of a few tens of meters. The base station is typically  connected to the  wired internet and thus serves to connect wireless users  to the wired  networks. In wide area wireless  access networks the base stations is  managed by a telecommunications  provider and serves users within  a radius of  tens of kilometres.

Wireless LAN are based on IEEE 802.11 technology ( also  knows  as wireless Ethernet and wi fi) are currently enjoying rapid  deployment in  university departments business offices, coffee cafes and homes. Using  this wireless LAN infrastructure students  send  and receive e mail or surf the web  from anywhere in campus ( for example  library dorm  room  classroom  or outdoor  campus bench.

Today  many  residences are combining  to broadband residential access with inexpensive wireless  LAN technology (cable  modern or DSL) with inexpensive wireless LAN technology  to create powerful  home  networks. This home  networks  consists  of a roaming laptop as  well as  three  stationary  PC ( two  wired one wireless) a base station  ( the  wireless access point) which communicates  with the  wireless  PCs  a cable  modern providing  broad  band  access to the internet and a router which  interconnects the base  station and the stationary PC with the cable  modern. This  networks allows  the residents  to having broadband internet access, if  one member roaming form  the kitchen to the backyard or to the bedroom.

When one  access the internet through wireless LAN technology one has typically  need to be within  a few  tens  of meters from  the base station. This is feasible  for home access coffee shop  access and  more generally access within  and around  a building.

 


Related Discussions:- Wireless access - computer network

Was the entire transaction completed, The following information was obtaine...

The following information was obtained from a host computer: 00:05:17.176507 74.125.228.54.1270 > 64.254.128.66.25: S 2688560409:2688560409(0) win 16384 (DF) (ttl 46, id 2096

Local loop portion of the service starts, What is the juncture at which the...

What is the juncture at which the CPE ends and the local loop portion of the service starts?  Ans) The demarcation or demarc is the juncture at which the CPE ends and the local

Tp-lite and tp-heavy monitors, What are TP-Lite and TP-Heavy Monitors? A...

What are TP-Lite and TP-Heavy Monitors? Ans) TP-Lite is simply the integration of TP Monitor functions in the database engines.TP-Heavy are TP Monitors which handles the Client/

What is tcp/ip, TCP/IP is a name provided to the collection (or suite) of n...

TCP/IP is a name provided to the collection (or suite) of networking protocols that have been used to construct the global Internet. The protocols are also referred to as the DoD (

Objectives of performance evaluations, OBJECTIVES After studying this ...

OBJECTIVES After studying this part, you should be able to: Explain the Metrics for Performance Evaluation; Notify about various Parallel System Overheads; Desc

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

Floating point representation in memory, Floating Point Representation in M...

Floating Point Representation in Memory 1. Describe the various ways of floating point representation in memory. What is the importance of normalizing the mantissa in this rep

Features of transmission control protocol, The major features of TCP are fo...

The major features of TCP are following: Reliability : TCP ensures that any data sent by a sender arrives at the destination as it was sent. There cannot be any data loss or mo

Hierarchical addressing and routing, The steps of forwarding the packets of...

The steps of forwarding the packets of information is known routing. The information about receivers is saved in routing tables. Note that several entries have same next hop. It is

Data alignment in processor arrangements, Data Alignment Arrays are ali...

Data Alignment Arrays are aligned to templates by the ALIGN directive. The ALIGN directive is used to align elements of different arrays with each other, indicating that they s

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd