Verified Document

Wireless Technology Is Difficult To Connect To Essay

Wireless Technology Is Difficult to Connect To Other Parts of Information Systems

There are many challenging aspects to even the most fundamental system and process integration tasks within organizations that have standardized on a common platform. When platforms vary significantly by protocol and by technologies, as TCP/IP-based networks often do across any organization, integration becomes even more difficult. When the strategies and processes that organizations rely on to attain objectives are included in the analysis, the challenges become even greater. Because of the multiplicity of these factors, it is very difficult to connect the many forms of wireless technologies into legacy, third-party and enterprise-wide systems within an organization.

Lack of Integration at the Protocol Structural Level

At the most fundamental level of integration wireless networks often support a varying standard to the Carrier Sense Multiple Access, Collision Detection (CSMA/CD) based protocols that full category-5 cabled networks do, in addition to having more options for optimizing network performance. Wireless protocols for example support both asynchronous and synchronous communication and have for decades successfully compared to many legacy information systems platforms from proprietary vendors including IBM and their Token Ring standard and others (Adams, Dimitriou, 2008). Wireless networks have quickly moved forward with their own standards, driven by the acceleration of the IEEE 802.11 baseline that define the technologies, parameters and options used acorss the frequency spectrum of wireless networks. These standards are also being driven by the accelerating nature of new product development cycles and the reliance on often conflicting, yet continually improving, Wi-Fi standards. While speed and customization of IEEE 802.11 standards continues...

Wi-Fi is heavily hyped today as it is seen as a critical marketing message for smartphones, tablet PCs, laptops and many other devices. In reality, the reliance on Wi-Fi standards has actually slowed down the performance of entire enterprise networks and has also led to "dead zones" within companies where wireless networks cannot either be configured or used due to security concerns (Adams, Dimitriou, 2008). The IEEE 802.11 standard, the lack of clarity on integration of wireless networks into legacy networking environments, the security and privacy concerns of using secured wireless networks, and the lack of adequate training in many organizations all lead to wireless networks failing to be successfully integrated into organizations. In addition to these structural issues, there are also performance and security issues that complicate the integration of wireless networks into companies as well.
The Challenges of Wireless Network Performance

In addition to the structural aspects of wireless networks not integrating well into legacy networks that are based on CSMA/CD and CSMA/CD (Token Ring) standards, there is also the lack of protocol consistency within and between wireless standards, which significantly reduces integration flexibility and performance as well. The conflicting protocol standards of wireless networks make full compatibility, connectivity and integration extremely difficult at the packet level, much less unifying a complex business process using varying protocols (Alonistioti, Patouni, Gazis, 2006). Of all factors most responsible for slowing the integration of wireless systems, this is the most common and most detrimental.…

Sources used in this document:
References

Adams, C., & Dimitriou, A.. (2008). A Two-Phase Authentication Protocol Using the Cell Phone as a Token. Journal of Information Privacy & Security, 4(2), 23-39.

Nancy Alonistioti, Eleni Patouni, Vangelis Gazis. (2006). Generic Architecture and Mechanisms for Protocol Reconfiguration. Mobile Networks and Applications, 11(6), 917-934.

Macedo, D., dos Santos, A., Correia, L., Nogueira, J., & Pujolle, G.. (2010). Transmission power and data rate aware routing on wireless networks. Computer Networks, 54(17), 2979.

Bruce Potter. (2007). Mobile security risks: ever evolving. Network Security, 2007(8), 19-20.
Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Healcare Assuming Role a Lead
Words: 998 Length: 3 Document Type: Essay

Technology in Healcare assuming role a lead person a technology advisory committee a large regional medical center. The medical center struggled ongoing problems related errors surrounding patient medication, misplaced lab results delays updating patient charts. Technology in the healthcare field: Improving communication At our institution, there are several serious issues that have arisen amongst our healthcare providers. The allegations carry enough weight that it is vital that our hospital respond to them and

Wireless Broadband Technology
Words: 20344 Length: 50 Document Type: Term Paper

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every

Wireless LAN and Wireless Man
Words: 3663 Length: 10 Document Type: Term Paper

These aspects should be considered while designing and implementing a network to gain maximum efficiency. (Trulove, 19-20) The standard that defines the application of a WLAN is IEEE 802.11 WLAN standard. Though this is the basic standard amended ones define the additional prescriptions added to it like 802.11a or 802.11b. The capacity of a WLAN is defined by its basic compatibility. WLAN of the latest version comes with an 11

Wireless Prevalence or Not There
Words: 631 Length: 2 Document Type: Essay

Modern homes are already providing their inhabitants with the technology that will be present in most houses in a few years. People are presently able to control mostly everything about their home through using wireless technology. With customers expressing an increasing hunger in data, wireless carriers do their best to satisfy the needs of these people. Companies providing wireless are currently investing in wireless equipment because analysts anticipate that

Technology Emerging Technologies the Shift
Words: 2370 Length: 9 Document Type: Term Paper

While the quality of Internet phone calls is still not as good as that of dial-up long-distance telephone, more and more users are taking advantage of Internet telephony because it offers free phone calls (McReal and Elliott, 2002). Internet telephony is straightforward and simple, requiring only an Internet hookup, headphones or speakers, and a microphone. For online students, Internet telephony offers an opportunity for students to speak to others in their

Wireless Networking
Words: 12201 Length: 44 Document Type: Term Paper

Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now