ISS Week 4 Discussion.docx - Week 4 Discussion What concerns should be understood about data communications being sent over wireless networks Discuss

ISS Week 4 Discussion.docx - Week 4 Discussion What...

This preview shows page 1 - 4 out of 8 pages.

Week 4 Discussion What concerns should be understood about data communications being sent over wireless networks? Discuss the pros and cons of one method of transmission, such as Wireless Application Protocol (Search the Internet for help in wireless networks). Wireless Internet access technology is being increasingly deployed in both office and public environments, as well as by the Internet users at home. We begin by outlining some of the basic technologies of wireless network systems. WIRELESS LOCAL AREA NETWORK A Wireless Local Area Network (WLAN) is a type of local area network that uses high frequency radio waves rather than wires to communicate between network-enabled devices Wireless Network Applications Most common wireless network applications remain restricted to internet use, web browsing, and instant/text messaging. Educational use being the most common allows access to college/university resources for viewing grades and schedules, downloading educational materials, such as eBooks, and downloading and uploading assignments (John Smith). The author has extensively used the notebook computer for attending both asynchronous and synchronous classes with Strayer University and for the other aforementioned purposes. Recently the use of mobile devices (smart phone, iPads, and laptops) for videoconferencing and virtual meetings has become a norm. Commercial use of mobile devices except for laptops, such as eCommerce, and eFinance, is still rare primarily due to security reasons. OPEN SYSTEM AUTHENTICATION
Image of page 1
Open System Authentication is the default authentication protocol for the 802.11 standard. It consists of a simple authentication request containing the station ID and an authentication response containing success or failure data. Upon successful authentication, both stations are considered mutually authenticated. It can be used with WEP (Wired Equivalent Privacy) protocol to provide better communication security, however it is important to note that the authentication management frames are still sent in clear text during authentication process. WEP is used only for encrypting data once the client is authenticated and associated. Any client can send its station ID in an attempt to associate with the AP. In effect, no authentication is actually done. Guide Wireless technology Pros and cons of wireless networking Wireless networks or WiFi (as wireless connections are commonly known) have a number of key business advantages over wired networks. Increased efficiency Improved data communications lead to faster transfer of information within businesses and between partners and customers. For example, sales people can remotely check stock levels and prices whilst on sales calls. Access and availability Because wireless technology allows the user to communicate while on the move, you are rarely out of touch - you don't need extra cables or adaptors to access office networks.
Image of page 2
Flexibility Office-based wireless workers can network without sitting at dedicated computers, and can continue to do productive work while away from the office. This can lead to new styles of
Image of page 3
Image of page 4

You've reached the end of your free preview.

Want to read all 8 pages?

  • Fall '17
  • Dr. Rick Livingood
  • Wi-Fi, Wireless network, access points

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture