• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Wirless Protocols

Extracts from this document...

Introduction

Bluetooth The Bluetooth specification was developed in 1994 by a Dutch man Jaap Haartsen and Sven Mattisson, who were working for Ericsson Mobile company.The specifications were formalized by the Bluetooth Special Interest Group (SIG). The SIG was formally announced on May 20, 1998. Today it has a membership of over 11,000 companies worldwide. It was established by Ericsson, IBM, Intel, Toshiba, and Nokia, and later joined by many other companies, who make use of its technology. Bluetooth is a wireless protocol used for the exchange of data; this technology is useful when transferring information and data between two or more devices that are near each other in low-bandwidth situations(however it doesn't work for long distances as the range is quite short in comparison to other technology i.e. WiFi) . Bluetooth is commonly used to transfer sound data (music) with mobile phones or byte data with hand-held computers (transferring files). ...read more.

Middle

for headsets or similar devices with a restricted user interface. During pairing, an initialization key or master key is generated, using the E22 algorithm. WiMax WiMax (Worldwide Interoperability for Microwave Access), is a telecommunications technology that provides wireless transmission and exchange of data using a variety of transmission modes. The technology provides up to 75 Mbit/s symmetric broadband speeds without the need for any cables, which makes it easy and user friendly. The technology is based on Broadband Wireless Access. WiMAX is a term which describes standard, interoperable implementations of IEEE 802.16 wireless networks. The WiMAX Forum has defined an architecture that defines how a WiMAX network connects with other networks, and a variety of other aspects of operating such a network, including address allocation, authentication, etc. * SS/MS: the Subscriber Station/Mobile Station * ASN: the Access Service Network * BS: Base station, part of the ASN * ASN-GW: the ASN Gateway, part of the ASN * CSN: the Connectivity Service Network * HA: Home Agent, part ...read more.

Conclusion

Wi-Fi technology has served to set up mesh network. It can also be use for data exchange and to play muli-player games through a WiFi connection. The most common wireless encryption standard, Wired Equivalent Privacy or WEP, has been shown to be easily penetrable even when correctly configured. Wi-Fi Protected Access (WPA and WPA2), which began shipping in 2003, aims to solve this problem and is now available on most products. Wi-Fi Access Points typically default to an "open" (encryption-free) mode. Novice user's benefit from a zero-configuration device that works out of the box, but this default is without any wireless security enabled, providing open wireless access to their LAN. To turn security on requires the user to configure the device. Wi-Fi networks that are open can be monitored and used to read and copy data (including personal information) transmitted over the network, unless another security method is used to secure the data, such as a VPN or a secure web page. Word Count: 823 Sources: www.wikipidea.org ?? ?? ?? ?? ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our International Baccalaureate Misc section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related International Baccalaureate Misc essays

  1. The Effect on Music in the Christian Church

    Pg.14 According to William C. Hunter in "Music in Your Church" "Hymns are a vital part of the church's worship experience, but people's hymns preferences are as varied as the people themselves are." A paraphrase of Abraham Lincoln's words is appropriate: "You can please all of the people some of

  2. ITGS portfolio Loss of employment and privacy issues regarding the rise of online grocery ...

    Just because you're placing your order online doesn't mean you should compromise on freshness, quality or accuracy when ordering online groceries. Know your vendor's complaint and return policy and don't be afraid to use it. Make sure to protect your personal information when shopping online - credit card information can

  1. ITGS portfolio Privacy and security issues that arise when using Health Information Technology to ...

    Some EHRs have warning systems built in to let your doctor know about drug allergies or potential problems with drug interactions. Also, some EHRs have medical alerts to remind your doctor to perform certain tests or procedures. For example, if you have diabetes, your doctor's EHR may remind your doctor

  2. Is wi-fi safe? Wi-Fi is widely used in mobile phones, gaming devices, house networks ...

    These places are knows as hotspots. The hotels, airports, schools often provide Wi-Fi. D: Solutions to problems arising from the issue Wireless access is a boon but at that same time it has its disadvantages. The network is not safe as terrorist use others Internet to connect to the Internet and using the owners IP they send a threat email.

  1. ITGS Portfolio :: Are Wi-Fi networks safe? My interview with an IT expert.

    lot in the past few years, which is an alternative to using the local area network wires. Every technology has its drawbacks and there are some complains about the Wi-Fi technologies. Wi-Fi has become very popular and most of the people are having it set up in their houses, offices, etc.

  2. Information Technology in a Global Society - analysis of an article "Using data mining ...

    Works Cited: Thearling, Kurt. "Data Mining and Privacy: A conflict in the making?" DS (1998. Web. June-July 2010 <http://www.thearling.com/text/dsstar/privacy.htm> Kaur, Harleen, and Siri Krishan Wasan. "Empirical Study on Applications of Data Mining Techniques in Healthcare." Journal of Computer Science (2006). Department of Mathematics, Jamia Millia Islamia. Web. June-July 2010. <http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.108.8981&rep=rep1&type=pdf>. ScienceDaily 18 December 2009.

  1. GCSE Welsh Baccalaureate Completed Diary Pages

    Having a healthy, balanced diet is also a main contributor in this as obesity is becoming increasingly more prevalent in wales due to an unhealthy diet with little physical activity. More and more people die of obesity and diseases caused by obesity such as heart disease every year.

  2. Can the work of architect Le Corbusier be explored in the context of the ...

    the use of pilotis (supports), 2. free façade walls, 3. large horizontal of strips of ribbon windows 4. the addition of a roof garden (Le Corbusier 1931, p.44) Pilotis are reinforced concrete poles or columns that made it possible to have free façade walls.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work