This website uses cookies to ensure you have the best experience. Learn more

Networks Essay

1339 words - 5 pages

Wireless Local Area Networks

     A wireless local area network (LAN) is a flexible data communications system implemented as an extension to, or as an alternative for, a wired LAN. It uses radio frequency (RF) technology, to transmit and receive data over the air, minimizing the need for wired connections. A wireless LAN system can combine data connectivity with user mobility.
     The data to be transmitted is modulated onto the radio waves, called carriers, and then are removed from the carriers at the other end by what is called a transceiver. End users in a wireless local area network access the network through adapters such as PC cards in laptop notebook computers. And PCI cards in desktop computers.
These cards provide the interface linking the network operating system (NOS) and the airwaves by means of an antenna. The wireless connection is clear to the network operating system as well as to those using the network, and it supports applications such as electronic mail (e-mail), access to shared peripherals, and access to multi-user databases and applications. Wireless LANs have gained popularity in areas such as the health-care, retail, manufacturing, warehousing and academia markets (Kurose, 2003).

Some widely known wireless technology in use in devices includes, cameras, automobiles, security systems, and kitchen appliances. Wireless LANs use electro magnetic airwaves (radio or infrared) to transmit information from one point to another without relying on any physical connection (Dean, 2000). Radio waves often are referred to as radio carriers because they simply perform the function to delivering energy to a remote receiver. Networking firms have a range of technologies to choose from when constructing wireless LANs. All technology comes with its own set of advantages and limitations. A narrowband radio system transmits and receives data on a specific radio frequency. Any unwanted crosstalk between communication channels is evaded by carefully designating different users on different channel frequencies. (Kurose, 2003)

The commonly used wireless systems used is the spread-spectrum technology, which is a wideband radio frequency technique developed by the military for use in reliable, secure communication systems. This technology is developed to substitute bandwidth effectiveness for security, reliability, and integrity (Dean, 2000). More bandwidth is consumed than in the case of narrowband transmission, but the end result produces a signal that is louder and easier to detect. If the receiver is not on the right frequency, a spread-spectrum signal looks like background noise. The two types of spread-spectrum radio are frequency hopping and direct sequence. (Behrouz, 2004)

Frequency-hopping spread-spectrum (FHSS) is a method that uses a narrow band carrier that changes frequencies in a distinct pattern. The signal hops to a variety of frequencies, with the exact sequence of...

Find Another Essay On Networks

vehicular networks Essay

617 words - 3 pages There is a lot of potential for assisting drivers and improving roads traffic safety using vehicular networks (VANETs). VANETs are ad-hoc networks, where vehicles and roadside station wirelessly interconnect. They are characterized by the high mobility of the nodes and their intermittent links. As a result, it is challenging to design a network that meets applications requirements efficiently and reliably. This paper reviews how packet

computer networks Essay

2139 words - 9 pages intended for (less than 4 Mbps) average speed transmissions. The next three categories provide better quality cables and have the following characteristics: they have three cables all 30 cms. Two pairs should not have the same sense of cables. o Category 3: This cable is often chosen in local networks. It is used for transmissions up to 10 Mbps. o Category 4 this cable is used for the transmissions at 16 Mbps. o Category 5: this cable is intended

Satellite Networks

2561 words - 10 pages into space to a satellite and back to earth to provide connectivity among many different network clients. The network can be designed to reach geographically remote sites, where installing land-based lines is not feasible. The only restriction is that the footprint of the satellite must match the area it covers. Satellite networks can use either Ku-band satellites, which use a 3-meter dish (this type of satellites used most commonly for cable

Social Networks

934 words - 4 pages responsibly if in a business setting. Facebook and LinkedIn’s store user profiles in NoSQL. It has a better processing and querying power than a traditional relational database. Whereas Twitter uses REST for its API, Facebook uses Graph API. Social networks are not entirely secure and suffer from security issues. Some flaws that have plagued Facebook are hoax applications and security holes. Although Facebook has the Facebook Immune System to find

Optical Networks

795 words - 3 pages audio.Sustaining through the Economic SlumpOn thing is for certain is that people will always need to communicate and they will always be looking for faster and more economical ways of doing so. Although the initial setup cost and maintenance for more expensive optical transmitters and receivers can far exceed the setup costs of wire based networks, the advantages of an optical network far exceed the disadvantages. The fiber optic network provides a

Online Networks

981 words - 4 pages take over what is “important” or not. The most talked about events are the things that people support to become prosperous. If they have the power to say what is important and believe that someone’s situation doesn’t have as much significance as others. How can a group of people create a development without the support of the media? The way that is has been done before anyone used social networks to know what is going on all over the world. If a

Securing networks

2340 words - 9 pages IntroductionThere have been many excellent papers, and books written on securing computer networks. They all largely address how to harden your network from the router on down to the switch, then eventually to the actual workstation itself. In many document cases of compromised networks, the end goal of the hacker was to suborn the actual workstation itself. The router, and sometimes a server of some kind, was not actually the end state of the

Wireless Sensors Networks Security

2213 words - 9 pages 1. Introduction Developments in micro electro mechanical systems (MEMS) and wireless networks are opening a new domain in networking history. Sensors; often called "smart dust" are low cost small tiny devices with limited coverage, low power, smaller memory sizes and low bandwidth, will play a key role in collecting and disseminating data from the fields where ordinary networks are unreachable for various environmental and strategical

Networks and Modern Communications

3036 words - 12 pages the appearance of a "flexibly separable" network management layer, embodied in the software that controls modern networks. Network control no longer required network ownership and could be shared among various participants in the telecom infrastructure: network owners and operators, network users, and third parties. This enabled a new evolution of network practices, building upon network experimentation and re-configuration, which we characterized

Artificial Neural Networks

1124 words - 4 pages Artificial neural networks (ANNs) were built to model the brain for the purpose of solving the problems humans alone cannot as well as to advance, artificial intelligence. To approximate organic beings and gain great computational power, to become a technological hybrid between sentient beings and advanced electronics; they are the future of advanced robotics. They can be used in miscellaneous fields such as speech recognition, prediction of

Virtual Private Networks

989 words - 4 pages Virtual Private Networks Virtual Private Networks (VPNs) are an easy and cost effective way to connect two or more networks over the Internet. This is achieved by using encrypted tunnels for security and efficiency. VPNs use encapsulated and encrypted IP packets and transport them across leased Local Area Network (LAN) lines. The benefits of using VPNs are reduced cost overhead, reduced management overhead, and added security

Similar Essays

Networks Administration Essay

787 words - 3 pages Career Pathway - Networks Administrator         For my career pathways class, I chose a Networks Administrator as my pathway. We were supposed to research on what were our careers about. I did this and found a handful of information.         What is a Networks Administrator? Well, a Networks Administrator is also known as a systems administrator, LAN (Local Area Network) administrator, information systems administrator, network

Neural Networks Essay

1326 words - 5 pages Neural Networks Abstract This paper will provide an introductory level discussion of neural networks within the field of artificial intelligence. This discussion will briefly cover the history of the neural network as well as recent advances within this field. In addition, several real world applications of neural networks will be discussed. Introduction The primary goal in the field of artificial intelligence is to construct a machine

Interfirm Networks Essay

1969 words - 8 pages 1. AbstractInterfirm networks have become of strategic important to many organizations since the 1990s. Discuss the advantages and potential pitfalls of interfirm networks, particularly in the form of strategic alliances and joint ventures.2. The notion of small world ; Interfirm networksA recent study (Baum, Shipilov and Rowley 2003, pg 697) has shown that "Interfirm networks often take on characteristics consistent with the notion of a small

Adhoc Networks Essay

3058 words - 12 pages Reliable Broadcasting in Mobile Ad-Hoc Networks ABSTRACT In a mobile ad-hoc network, providing a reliable broadcast is one of the most important requirements. In broadcasting, a source node sends a message to all the other nodes in the network. Broadcasting operation is expected to be executed more frequently in mobile ad-hoc networks MANETs. So the number of retransmissions in the broadcast has to be minimized. The reliable broadcast