Wireless access - computer network, Computer Networking

Assignment Help:

Wireless Access

Wireless access connecting end  systems ( that are often  mobile) into the network. Today there are two broad types  of wireless internet access(1) wireless and (2) wide  area wireless. In a wireless LAN wireless users transmit  receive packets to form a base station ( also  known  as a wireless access point)  within a read us of a few tens of meters. The base station is typically  connected to the  wired internet and thus serves to connect wireless users  to the wired  networks. In wide area wireless  access networks the base stations is  managed by a telecommunications  provider and serves users within  a radius of  tens of kilometres.

Wireless LAN are based on IEEE 802.11 technology ( also  knows  as wireless Ethernet and wi fi) are currently enjoying rapid  deployment in  university departments business offices, coffee cafes and homes. Using  this wireless LAN infrastructure students  send  and receive e mail or surf the web  from anywhere in campus ( for example  library dorm  room  classroom  or outdoor  campus bench.

Today  many  residences are combining  to broadband residential access with inexpensive wireless  LAN technology (cable  modern or DSL) with inexpensive wireless LAN technology  to create powerful  home  networks. This home  networks  consists  of a roaming laptop as  well as  three  stationary  PC ( two  wired one wireless) a base station  ( the  wireless access point) which communicates  with the  wireless  PCs  a cable  modern providing  broad  band  access to the internet and a router which  interconnects the base  station and the stationary PC with the cable  modern. This  networks allows  the residents  to having broadband internet access, if  one member roaming form  the kitchen to the backyard or to the bedroom.

When one  access the internet through wireless LAN technology one has typically  need to be within  a few  tens  of meters from  the base station. This is feasible  for home access coffee shop  access and  more generally access within  and around  a building.

 


Related Discussions:- Wireless access - computer network

What is bit stuffing, What is Bit Stuffing? Bit stuffing is the process...

What is Bit Stuffing? Bit stuffing is the process of adding one extra 0 whenever five consecutive is follow a 0 in the data, so that the receiver does not mistake the pattern 0

How big can an intranet be, How big can an Intranet be? An Intranet ca...

How big can an Intranet be? An Intranet can be as big as a community of interest. Scale is an important factor in web implementation, but it has no bearing on the logical asso

Redundant routing information, Notice repetition of information in routing ...

Notice repetition of information in routing table for node 1 as given above in the figure. We can see that switch has only outgoing connection, all traffic must goes that connec

Advantages of ls over dv algorithm, Advantages of LS over DV algorithm ...

Advantages of LS over DV algorithm There  are a number of advantages to link  state  protocols  especially when  compared to  the distance vector based  routing  protocols. The

Ring token, what is logical ring maintenance and how does it work>?

what is logical ring maintenance and how does it work>?

Parallel construct in openmp, Parallel Construct The syntax of the para...

Parallel Construct The syntax of the parallel construct is as follows: #pragma omp parallel [set of clauses]  where clause is one of the following:  structured-block if(sca

Explain the characteristics of mobile computing applications, Question : ...

Question : a) In your view, what are the top three strengths and weaknesses of wireless systems? Rank them in order of priority. What can be done to address the weaknesses?

What is a binary semaphore, What is a binary semaphore? What is its u...

What is a binary semaphore? What is its use? A binary semaphore is takes only 0 and 1 as values. They are used to execute mutual exclusion and synchronize concurrent p

Ftp and ftp application layer protocols, What is the difference between TFT...

What is the difference between TFTP and FTP application layer protocols? Ans) TFTP - Trivial File Transfer Protocol A stripped down version of FTP, easy to use and fast. TFTP

Original classes of ip addresses, The original IP address procedure divides...

The original IP address procedure divides host addresses into three base classes. The class of an address calculates the boundary between the network suffix and prefix. The origina

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd