802.11 wireless lans and csma/ca, Computer Network Security

 

802.11 WIRELESS LANs AND CSMA/CA:

 IEEE 802.11 is standard wireless LAN that needs radio signals at 2.4GHz. Its speed is 11Mbps. The older computers use radio signals at data rate of 2Mbps and 900MHz. Bluetooth specifies a wireless LAN for short places. It needs shared medium and radio signals instead of coaxial cable.

LIMITED CONNECTIVITY WITH WIRELESS:

 In contrast with wired LANs, not all methods can be able to reach each other.Because:

  • It has low signal power.
  • In wireless LANs the propagation is stopped by walls etc.
  • It can't relay on CD to avoid interference because not all participants can hear.

This is given in the figure below:

 

1546_802.11 WIRELESS LANs AND CSMA.png

Posted Date: 7/30/2012 7:26:48 AM | Location : United States







Related Discussions:- 802.11 wireless lans and csma/ca, Assignment Help, Ask Question on 802.11 wireless lans and csma/ca, Get Answer, Expert's Help, 802.11 wireless lans and csma/ca Discussions

Write discussion on 802.11 wireless lans and csma/ca
Your posts are moderated
Related Questions
Question: (a) Explain and illustrate with a drawing the three-layer feedforward multilayer perceptron neural network. (b) Summarize the standard backpropagation algorithm in

Is standard TCP effective in mobile wireless networks that operate with the IEEE 802.11 wireless local area network protocol?Discuss the issue

Encode the following plaintext, using the Caesar cipher:             LORD OF THE RINGS b) The following ciphertext              jw njbh lxmn cx kanjt has been encoded usi

REASON FOR MULTIPLE TOPOLOGIES Every topology has disadvantages and advantages, which are described below: IN A RING:  It is simple to coordinate access to other dev

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Problem (a) Differentiate between private key and public key encryption. (b) What issue with private key encryption is resolved with public key encryption? (c) Describe

Question 1:  Describe the functioning of cloud computing. Question 2: Discuss on "Platform as a Service". Question 3: Discuss the steps involved in effective co

attacks on crytography

(a) Consider the subsequent authentication options: A. Using password. B. Using pin and fingerprint Which option A or B provides stronger security and why? (b) Give

TRANSMISSION ERRORS:  Transmission exceptions may happen due to different causes for example power surges or interference may delete data during transmission. In result of wh