Page 131 - DCAP307_PLANNING_AND_MANAGING_IT_INFRASTRUCTURE
P. 131
Unit 7: Wireless Networks
don’t need any professional installation just connect to a power outlet with an Ethernet Notes
cord, and start browsing. Wi-Fi security system for Threats makes it more renewable and
its tool protect your VPN and secure web page. You can easily configure the device to take
better performance. The standard devices, embedded systems and network security make
it more powerful.
Wi-Fi with no limitation: You can use a “Wi-Fi” network with no limitation because it
can connect you worldwide. You can easily reach to your requirements with Wi-Fi
networking applications because the power consumption is very high as compared to
other bandwidth. The vision of wireless network is bright with Pre-N products and high
quality media streaming.
7.3.2 Wi-Fi Limitations
Wi-Fi technology supports two types, one is called “infrastructure” other one is “Ad hoc”. In ad
hoc Wi-Fi network can be connected without central device known as router or access point. Ad
hoc mode is always preferred over infrastructure mode, however ad hoc networks have following
issues. Wi-Fi devices configure on Ad hoc mode offers nominal security against network intruders.
Ad hock Wi-Fi configured devices cannot disable SSID broadcast in contrast to infrastructure
mode. Network attackers will not required much of effort to prevail in Ad hoc Network.
Using Ad hoc mode signals issues can experienced where as using alternative infrastructure
mode will provide full strength singles. Wi-Fi networking standard including 802.11g requires
ad hoc mode of communication supports which 11Mbps bandwidth. Wi-Fi devices when
configured to infrastructure mode can transfer data up to 54 Mbps, where as using ad hoc mode
only 11 mbps can be achieved. Ad hoc mode is considered slower in comparison to infrastructure
for this reason. The following are some of the limitations of Wi-Fi:
Security concerns: It is simple to set Wi-Fi network but keeping it secure takes much more
effort, Access points of Wi-Fi do not deploy encryption methods. It is required to be done
as network is enabled. Secure Wi-Fi network can be easily attacked by hackers to steal
private information. Guests who are not potentially harmful can still utilise the network
resources and minimise the performance.
Interference from other devices: Wi-Fi transmits data at 2.4 GHz making susceptible to
interfere Bluetooth enabled devices, mobile phones, cordless, Microwaves and other
communication devices, closer the interfering devices are the poor communication will
be and vice versa.
Lacking high-quality media streaming: Today’s fastest Wi-Fi standards are pushed beyond
their limit when trying to view high end media. High definition video and audios cannot
be viewed flawlessly because of lower transfer rate; things can be much more worst if
other clients are accessing the same access points.
Even the fastest current Wi-Fi standards are pushed beyond their limit when trying to handle
some of today’s high-end media. High-definition audio and video files are timely-delivery-
intensive, and typical wireless networks have neither the transfer speeds nor the consistency to
transfer them flawlessly. This problem is further compounded if there are multiple devices
connected to the same because the bandwidth must be divided between all of the equipment.
Task Make distinction between “Infrastructure” and “Ad-hoc”.
LOVELY PROFESSIONAL UNIVERSITY 125