802.11 wireless lans and csma/ca, Computer Network Security

 

802.11 WIRELESS LANs AND CSMA/CA:

 IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data rate of 2Mbps and 900MHz. Bluetooth specifies a wireless LAN for short places. It needs shared medium and radio signals instead of coaxial cable.

LIMITED CONNECTIVITY WITH WIRELESS:

 In contrast with wired LANs, not all methods can be able to reach each other.Because:

  • It has low signal power.
  • In wireless LANs the propagation is stopped by walls etc.
  • It can't relay on CD to avoid interference because not all participants can hear.

This is given in the figure below:

 

1546_802.11 WIRELESS LANs AND CSMA.png

Posted Date: 7/30/2012 7:26:48 AM | Location : United States







Related Discussions:- 802.11 wireless lans and csma/ca, Assignment Help, Ask Question on 802.11 wireless lans and csma/ca, Get Answer, Expert's Help, 802.11 wireless lans and csma/ca Discussions

Write discussion on 802.11 wireless lans and csma/ca
Your posts are moderated
Related Questions
WFABilling project in Java:  Project Title: WFABilling   Role                      : Developer Domain                 : Tele-Com Environment          : Java, J2EE, S

briefly expslain type of e-commerce

Question: (a) i. Explain what is meant by Discretionary Access Control and Mandatory Access Control ii. Which method would be the most effective to ensure that users do

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

UDP COMMUNICATION SEMANTICS:  UDP needs IP for all delivery, that is, similar best effort delivery as IP. To use UDP, an application have to either be immune to the causes or

CSMA/CA Wireless needs collision avoid ness rather than collision checking. Transmitting computer puts very short codes to receiver. Receiver responds with short message getti

QUESTION (a) A convex flow problem is a non linear network flow problem. Explain how a convex flow problem could be transformed into a Minimum Cost Flow problem. (b) Exp

INFORMATION SECURITY POLICY PRACTICES AND STANDARDS Management from all the communities of interest should consider policies as basis for all information security efforts. Polic