Advantages And Disadvantages Of Wireless Communication
Words: 1309
Pages: 6
Fall Semester 20171 Fundamentals of Information Security – 3153020
Assignment: Wireless Security
Done by: Abdullah Ali Alwan 201410419
Wireless Communications: Wireless communications are defined as the transmission of digital data while connected to some type of data network, without the use of any cabling. A device that utilizes wireless communications would be a smartphone, as it can connect to a network without using a wire. There are different technologies that uses wireless communications, such as: 1. Wi-Fi: The most popular and recognizable of technologies. It enables any device to connect to the internet using a wireless router. It is also used on other devices that support this type of technology. A person can Satellite Networks: Some companies or research centers may be located on an isolated location where there is no easy access to the internet. Therefore, they send signals from a remote location to a satellite laying in orbit to connect to the internet by using a satellite router. Satellite networks are used for GPS, weather forecast, and even internet access on airplanes
Advantages of wireless communications: • Convenient to use: Users can access network resources from any location within their networking environment, without having to find an ethernet cable for this purpose. • Expandable: Wireless networks can serve a large number of clients without resorting to new hardware, while wired communications require additional cabling. • More productive: An employee can do their work at any place that has wireless networks, without having to resort to using a workstation from their main place of work • Mobility: Users can access wireless networks from anywhere within any range.
Disadvantages: • Difficult to setup for user with little experience • More vulnerable than wired networks (e.g.: WPA, WPA2) • Wireless networks use wave signals to transmit data, therefore they are more prone to disruption due to factors such as wave cancellation due to long distances. • Slower speeds than wired This protocol provides better data encryption than WEP, and it also provides user authentication. WPA also uses RC4 cipher algorithm, but has more features such as: 1. Stronger authentication: WPA uses EAP, a user authentication protocol that ensures that users are who they claim to be. 2. Longer keys: The length of the IV is increased to 48 bits, and the master key is increased to lengths up to 128 bits. 3. Temporal Key Integrity Protocol (TKIP): a security protocol that can generate different keys on every packet sent. 4. Message integrity code (MIC): protects messages from replay attacks and ensures that messages have not been altered. Temporal Key Integrity Protocol (TKIP) is a protocol that is used by WPA to provide data encryption which works the same as the RC4 algorithm, except with longer keys. It works by changing the key of each packet sent by the user. However, it does not protect against eavesdroppers as they can catch the key exchange between two
Related Documents: Advantages And Disadvantages Of Wireless Communication
telecommunications industry and its major technologies. 1.2 Identify past and present voice communications technologies. 1.3 Describe telecommunications network structures. 3/19/12 * Reading Read the “Political and Regulatory Forces in Telecommunications” section in Ch. 1, “Telecommunications Technology Fundamentals,” of Telecommunications Essentials. 3/19/12 * Reading Read Ch. 3, “Establishing Communications Channels,” of Telecommunications Essentials. 3/19/12 * Reading Read the “The PSTN Infrastructure”…
understanding of essential wireless basics; describe applications used in wireless technology; report on your findings succinctly and accurately; and practice full referencing. Instructions Answer ALL the questions below. Follow the word limit (if applicable) as instructed in each given question. It is advisable to conduct research (via any means) and apply relevant diagram(s) (wherever necessary) before attempting to answer. 1 Explain two health concerns when using wireless technologies? What are…
Wireless Portable Sensor for Athletic Monitoring BY Srinivas Juluri Yashwanth Nimmala Srikanth Reddy Jaidi Sailesh Oduri Rohith Vangalla INTRODUCTION Physical activates are an essential characteristics for the maintenance of health and fitness of an individual. The advantage of microelectronics allowed the development of miniature data acquisition devices that can be used for constant monitoring of human health. SYSTEM HARDWARE Circuit Diagram What is ZigBee? • Low Data, Low Power Wireless…
Wireless Network Design Exercise Student Name(s) Timothy Chue I. Your employer, XelPharm, is a large manufacturer and distributor of generic, over-the-counter healthcare products. Its main campus consists of three buildings within two blocks of each other. Each building houses approximately 200 employees, including those in the following departments: Administration, Accounting, Research, Legal, Quality Control, Order Fulfillment, and Production. In addition, XelPharm owns a large distribution…
Motorola Inc. The Battle for Survival Brenda Hawkins Professor Dwight Heaster Sr. seminar in Business Administration May 14, 2011 Abstract This paper will examine the technologies of the Motorola Corporation, looking at how it has created a competitive advantage in different economic times. It will compare Motorola with a variety of other companies before considering the future both in terms of its financial standing and its product offerings. This paper illustrates that Motorola has made important contributions…
Partial Fulfillment of the Requirements for the Degree BACHELOR OF ARTS IN MASS COMMUNICATION By: MELODY Q. PINEDA March 2008 APPROVAL SHEET The thesis attached hereto entitled USE OF CELL PHONE IN MODERN COURTSHIP AMONG NURSING STUDENTS OF ISABELA STATE UNIVERSITY- ECHAGUE, prepared and submitted by MELODY Q. PINEDA, in partial fulfillment of the requirements for the degree BACHELOR OF ARTS IN MASS COMMUNICATION is hereby endorsed. ADVISORY COMMITTEE ANNALIZA T.…
Assignment 2 Discuss the advantages and disadvantages for organisations wishing to become ‘mobile enterprises’ from both the perspectives of the employers and employees. Mobile enterprise is when a corporation or large organization that supports critical business functions and use of business applications via wireless mobile devices. Some of the mobile enterprise functions include manage projects, access to e-mail and online chat, provide information about customer relationship management (CRM) and…
According to wiki “wireless security is the method of preventing unauthorised access to computers through wireless medium”. Today whole globe is under the massive use of wireless technology, every time various faults are being detected and thousands of people are involved to minimize risk each and every time. Because of the rapid use of technology especially wireless technology hackers are trying to invade the whole system and are trying various tactics to resolve the issues. In the…
...................................................5 What is LTE?.......................................................................................................................7 Wireless Technologies and Their Networks………………………………………………7 Customer Devices…………………………………………………………………………9 Design a Wireless Network……………………………………………………………………...9 System and Service Description…………………………………………………………..9 Coverage Analysis……………………………………………………………………….11 Compatibility Plans………………………………………………………………………………
train. User encounter loss of signal poor reception and rarely seem to have a good connection at all. The aim of my project is to provide a constant internet signal on a moving train utilising wireless connectivity. This will aloow users to connect to the internet while on the train using any wireless enabled devices such as Tablet Pc, mobile phone, laptop exe.... As wifi signal from one router is limited I will be intending to use many routers which will run along the train track. Power to them…