Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802

Computer Science

What are the various technologies employed by wireless devices to maximize their use of the available radio frequencies? Also discuss methods used to secure 802.11 wireless networking in your initial thread.

  • Ask an interesting, thoughtful question pertaining to the topic
  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE

Answer Preview

Wireless Devices

 

Introduction

Before we get into too much detail, one question stands out in this particular discussion. What factors impair the successful transmission of radio frequencies to their receptors? A radio frequency is an electromagnetic wave frequency with an oscillation rate between 300 gigahertz and 9 kilohertz. Technological advancements have made the application of radio frequencies to be employed by wireless devices. As the name suggests, wireless devices are electronic devices that do not use cords.802.11 are a standard suffix extension developed by the Institute of Electrical and Electronics Engineers (IEEE) and were the original wireless specification. 

Wireless networks apply radio frequencies and have proven to be very effective for broadcasting and communication. Therefore, it is essential to ensure maximum use of the energy spectrum and ensure the network is adequately secured to avoid information breaches.

Additional information

National laws regulate the transmission and generation of frequency bands to prevent user interference and J’s coordinates by an international body. This body known as ITU coordinates the use of radio spectrums while promoting the assignment of satellites to improve telecommunications. Radio spectrums are divided by their frequency speeds, such as Super low frequency with a 30-300 Hz frequency. These frequencies also determine the use of the radio spectrums, and for instance, the super low frequency is used for submarine communication. The ultra-high frequency of 300-3000MHz is the frequency used in wireless devices such as wireless LAN and devices such as Bluetooth.

 

 

 

Technologies used

 Many wireless technology solutions leverage cellular networks since they already have developed hardware and readily defined protocols. However, these networks are expensive and are not ideal for most wireless technology since they were designed for low latency communications. Low power wide area networks extend coverage into challenging radio environments and address other unique solutions of Internet of Things devices.

Long-range technologies offer a combination of long-range and low power consumption and indoor coverage. On the bright side, it provides an encrypted data transmission. It also uses spread spectrum technology, ensuring less interference from adjacent transmitters to increase each gateway capacity (Wilensky et al., 2019, p. 131). Hence, this enables the network to cover long network ranges of communications while still offering a solid communication link

Cognitive radio technology is a proposition for the opportunistic spectrum band usage. Keep in mind this is made possible through utilizing vacant licensed channels. Positively, this offers a vast spectrum to enable efficient deployment of large scale networks.

Information-Centric Networking (ICN) decouples a service requester from a provider. These causes in-network content catching that allows the retrieval of services in proximity to the mobile node. Integrating cognitive radio technology and information Centric networking is also an elementary proposition in intelligent cities (Aloqaily et al., 2020, p. 254-266).

Security for 802.11

802.11 is the initial name for the WiFi network. Its indulgence in several networks as well as the internet may make it prone to several security breaches. Evolutions of wireless networks have also led to more developed protocols to ensure their security. Passwords are no longer sufficient encryption with increased organized cybercrimes. Wireless access points can enable one of four encryption standards, namely, Wired Equivalent Privacy (WEP), WiFi Protected Access, WPA2 or WPA3. Currently, WPA3 is the most efficient form of wireless security since it is the most up to date. WPA2 is efficient in the cases where a wireless network cannot be used in an application. The initial security methods are outdated and could be a vulnerability for the wireless network (Kissi, 2020, p. 975).

Experience

As an experience, I one time used a friend’s WiFi network. The wireless network is fast, effective in searching for web content, and could use multiple devices. Negatively, my laptop was hacked via a loophole set through the network.

Conclusion

Technologies have made possible applications of different methods to apply radio waves for effective communication. Even with radio waves getting used in the application of wireless networks, making work efficient, it is essential to secure a network to prevent data breaches in the sharing network. 

Wireless Devices Outlines

Thesis Statement: Wireless networks apply radio frequencies and have proven to be very effective for broadcasting and communication. Therefore, it is essential to ensure maximum use of the energy spectrum and ensure the network is adequately secured to avoid information breaches.

  1. Introduction
  1. A radio frequency is an electromagnetic wave frequency with an oscillation rate between 300 gigahertz and 9 kilohertz.
  2. Technological advancements have made the application of radio frequencies to be employed by wireless devices.
  3. Wireless devices are electronic devices that do not use cords.802.11 are a standard suffix extension developed by the Institute of Electrical and Electronics Engineers (IEEE) and were the original wireless specification. 
  1. Additional information

National laws regulate the transmission and generation of frequency bands to prevent user interference and J’s coordinates by an international body.

Radio spectrums are divided by their frequency speeds, such as Super low frequency with a 30-300 Hz frequency.

The ultra-high frequency of 300-3000MHz is the frequency used in wireless devices such as wireless LAN and devices such as Bluetooth.

  1. Technologies used
  1. Many wireless technology solutions leverage cellular networks since they already have developed hardware and readily defined protocols.
  2. Long-range technologies offer a combination of long-range and low power consumption and indoor coverage.
  3. Cognitive radio technology is a proposition for the opportunistic spectrum band usage.
  4. Information-Centric Networking (ICN) decouples a service requester from a provider.
  1. Security for 802.11
  1. 802.11 is the initial name for the WiFi network. Its indulgence in several networks as well as the internet may make it prone to several security breaches.
  2. Wireless access points can enable one of four encryption standards, namely, Wired Equivalent Privacy (WEP), WiFi Protected Access, WPA2 or WPA3.
  3. WPA3 is the most efficient form of wireless security since it is the most up to date.
  1. Experience
  1. The wireless network is fast, effective in searching for web content, and could use multiple devices.
  2. Negatively, my laptop was hacked via a loophole set through the network.
  1. Conclusion

Technologies have made possible applications of different methods to apply radio waves for effective communication. Even with radio waves getting used in the application of wireless networks, making work efficient, it is essential to secure a network to prevent data breaches in the sharing network. 

Related Questions