preview

Wireless Technology Essay

Good Essays

Wireless technology has become the wave of the future. From cellular phones to wireless point of sale devices, wireless networks and technology is all around us. In order to jump on the wireless train, one must first understand the different standards. To properly and safely utilize wireless technology the user also must understand the various types of wireless security. Once grasping these technologies and standards, anyone can implement a wireless network in their home. First, the 802.11b wireless networking standard, which is the most common consumer based standard. The 802.11b standard's frequency is in the 2.4 GHz range which is common with most cordless land line telephones and some microwave ovens. There are not really many …show more content…

An upgrade to 802.11b is 802.11g which offers some of the same technology as 802.11b but with significant upgrades and improvements. The most significant improvement over the 802.11b standard is the speed. 802.11g supports speeds upwards of 55mbps which is a huge increase over the 11mbps of 802.11b. This standard operates at 2.4 GHz which is the same frequency that the 802.11b standard operates at. Another great thing about the 802.11g technology is it is backwards compatible with a 802.11b wireless card so there is no need to go out and buy a new wireless network card for your computers. Finally a brand new standard that is still in its infancy stages and still has yet to be ratified by the IEEE is 802.11n. 802.11n will be a huge step towards equality amongst wireless and wired networks. First, the standard sets a speed requirement of at least 100mbps which is common amongst most wired computer networks. It is most likely that the throughput will be in the 200mbps range with a maximum being set in the 600mbps range. Looks like the 802.11n standard will be operating at both 2.4 GHz and 5 GHz frequencies. Look for the final 802.11n draft out in April of 2009. After choosing a particular standard to go with and buying the equipment to support that standard, one need to know the method of security they wish to implement on their

Get Access