Wireless Technologies Research Paper

Wireless Technologies
An introduction to wireless technologies including architecture, benefits and risk management.
# 147641 | 2,591 words | 10 sources | MLA | 2010 | KE


$19.95 Buy and instantly download this paper now

Description:

This paper assesses wireless technology in general. It explains what wireless technology is and gives a brief history of its development. The paper also provides examples of wireless devices, those that have been in existence for a long time as well as more recent inventions, and the general architecture of these devices and systems. Benefits of this technology are also reviewed. Finally, the risks associated with wireless are assessed and consequently the risk management measures.

Outline:
Introduction
Architecture of a Wireless Network
Benefits of Wireless Technology
Security Risks and Risk Management
Access Control Methods
Conclusion

From the Paper:

"Wireless technology refers to telecommunications in which the use of wire to carry signals over the communication path is partially or completely eliminated. Rather, electromagnetic waves are used for transmission. TV and Radio broadcasting, mobile phone and blue tooth are some examples of wireless technologies. Many of these technologies use electromagnetic waves. Wireless technology was invented in 1886 by Heinrich Rudolf Hertz when he demonstrated transmission and reception of radio signals (Girish). In 1914, the sinking of Titanic prompted authorities to regulate a rule which required all ships offshore to have radios which were to be manned round the clock. This gave a boost to the radio technology and gave raise to a new era of radio telephony and telegraphy. In the 1960s, the first satellite for communication only, Telstart, was launched and it made communication to any part of world possible."

Sample of Sources Used:

  • Bwilds. Unwired: Building & Maintaining Secure Wireless Networks. 21 November 2006. 29 April 2010 <http://it.toolbox.com/blogs/unwired/wireless-network-security-mac-address-spoofing-13077>.
  • Geier, Jim. Wireless System Architecture: How Wireless Works. 22 October 2004. 29 April 2010 <http://www.ciscopress.com/articles/article.asp?p=344242>.
  • Girish. What is Wireless Technology - history , trends. 28 September 2009. 29 April 2010 <http://dotgiri.com/2009/09/28/what-is-wireless-technology-types-of-wireless-and-history/>.
  • Khatod, Anil. Securing the Air: Recognizing Risk in Wireless. 4 October 2004. 29 April 2010 <http://www.computerworld.com/s/article/96303/Securing_the_Air_Recognizing_Risk_in_Wireless>.
  • Malcolm, Jerry. Security Risks In The Wireless Computing Environment. 22 December 2004. 29 April 2010 <http://www.net-security.org/article.php?id=755&p=3>.

Cite this Research Paper:

APA Format

Wireless Technologies (2011, May 29) Retrieved September 23, 2019, from https://www.academon.com/research-paper/wireless-technologies-147641/

MLA Format

"Wireless Technologies" 29 May 2011. Web. 23 September. 2019. <https://www.academon.com/research-paper/wireless-technologies-147641/>

Comments