Wireless lan technology, Computer Networking

Assignment Help:

The are various limitations of employing Wireless LAN technology in any multistory building in middle of Melbourne or any other big city are:

• Range: The main problem of Wireless LAN technology employed at a multistory building is the range of the network. Anonymous (2007-2009) cites that "The typical range of a common802.11g network with standard equipment is on the order of tens of meters."

The technology is sufficient only for home structure but not for larger structure and for obtaining additional ranges, there is requirements of purchasing repeaters, additional access points and repeaters etc which is call for additional cost.

• Safety and Security: As Wireless LAN technology uses the radio waves for the data transmission in the system. These radio waves are highly sensitive that it can be interfered with the waves coming from other devices or high-tech equipments which is not safe and secure for data transmission over the network. The Access points of WLAN technology are not deployed with encryption which are highly vulnerable and can be easily attacked by the hackers.

• Lack of high quality media streaming: When there are multiple users or ports connected to same access point then the bandwidth get divided into all which creates problem and provides low transfer rate. The speed of the Wireless LAN is the main issue when this technology is implemented in a multistory building as there are multiple users connected. A Wireless LAN has a range of 100 feet without breaking the connection which is not a good way for network in a multistory building.

• Cost: The cost is the main issue for Wireless LAN technology because there is need of installation of cable wires, access points, adapters, wireless connection, etc which depends upon the wireless technology used.


Related Discussions:- Wireless lan technology

Layer, what is end to end and host to host?

what is end to end and host to host?

ICT, state the advantages of the ICT

state the advantages of the ICT

What are the internal threats - security, What are the Internal Threats ...

What are the Internal Threats Internal security problems are probably the most common. One never knows what someone is going to do. Even the most loyal employees or workers can

What are the possible ways of data exchange in ccna, Normal 0 f...

Normal 0 false false false EN-IN X-NONE X-NONE MicrosoftInternetExplorer4

Types of topologies, TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOL...

TWO DIFFERENT KINDS OF TOPOLOGIES: LOGICAL TOPOLOGY:  It is described by the specific network technology. PHYSICL TOPOLOGY: It relays on the wiring scheme. NE

Firewalls, Firewalls Firewalls emerged as a new technology in 1990s but...

Firewalls Firewalls emerged as a new technology in 1990s but its idea was present near two decades back. Historical context of "Firewall" is quite literal. It was in use to des

Circuit switched networks, Question 1 Write about                       Ci...

Question 1 Write about                       Circuit Switched Networks                       Packet Switched Networks Question 2 Write about                       Protocol Indep

Message oriented middleware , What is Message Oriented Middleware (MOM)? ...

What is Message Oriented Middleware (MOM)? Ans) MOM permits general purpose messages to be exchanged in a Client/Server system using message queues. Applications communicate ove

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd