802.11 wireless lans and csma/ca, Computer Network Security

 

802.11 WIRELESS LANs AND CSMA/CA:

 IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data rate of 2Mbps and 900MHz. Bluetooth specifies a wireless LAN for short places. It needs shared medium and radio signals instead of coaxial cable.

LIMITED CONNECTIVITY WITH WIRELESS:

 In contrast with wired LANs, not all methods can be able to reach each other.Because:

  • It has low signal power.
  • In wireless LANs the propagation is stopped by walls etc.
  • It can't relay on CD to avoid interference because not all participants can hear.

This is given in the figure below:

 

1546_802.11 WIRELESS LANs AND CSMA.png

Posted Date: 7/30/2012 7:26:48 AM | Location : United States







Related Discussions:- 802.11 wireless lans and csma/ca, Assignment Help, Ask Question on 802.11 wireless lans and csma/ca, Get Answer, Expert's Help, 802.11 wireless lans and csma/ca Discussions

Write discussion on 802.11 wireless lans and csma/ca
Your posts are moderated
Related Questions
Bridges perform both in the data link layers and physical of LANs of same kind. They split a bigger network in to smaller segments. They have logic that accept them to store the

According to the case, The EZ Company introduced a new technology, focusing on the principles of informationintegration and visualization. The company started negotiatinga saleto a

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

Stateless Packet Filtering Stateless or static packet filtering is the most straightforward kind of packet filtering that allows or disallows data transfer based on the addres

Re: Website Google Ranking Hello! Hope you are doing well. I discovered some major issues in your website which might be the cause for the Google Penalties and poor search ranki

All references using actual quotes, paraphrase, or specific arguments, should employ page numbers. The essay is based on the unit content and should engage with the set readings, a


(a) Define what you understand by the following terms in Network Flows: i) UnDirected Path ii) Directed Path iii) Directed Cycle. iv) Tree In each of the above, expla

The world has to deal with newly released vulnerabilities on a daily basis.  These vulnerabilities eventually lead to active exploits of systems, and it is our job as cyber securit