Advantages and Disadvantages of Wireless Internet Architectures

Advantages The following are the key advantages of wireless Internet (thin client) architecture: Minimal to zero software deployment. This allows applications to be deployed without any additional client-side configuration. Updates to these applications are also straightforward since only the server has to be updated. Extends Internet computing model. Many corporate applications are based on the Internet model. Wireless Internet is a natural extension to these applications. Familiar user interface. Many users are familiar with a browser interface to their applications. Providing a similar interface on mobile devices allows them to be productive immediately;…Read more …

Multiplexing Techniques in Wireless

Multiplexing is a term used to describe how a signal can be divided among multiple users. This spectrum sharing allows wireless operators to maximize the use of their spectrum to accommodate a large number of users over fewer channels. For digital systems, three main multiplexing techniques are being used for wide area networks: frequency division, time division, and code division. A fourth method, called orthogonal frequency division, is the most complex of all of these methods. It is commonly used in high-speed local area networks, but is starting to grow in popularity for…Read more …

Bluetooth

A wireless technology that enables short-range wireless data connections between devices. The name came from: Harald Bluetooth, a Viking and king of Denmark from the years 940 to 981, was renown for his ability to help people communicate. During his reign, he united Denmark and Norway. Bluetooth wireless technology is a worldwide specification for low-cost radio that provides links between mobile computers, mobile phones, other portable handheld devices, and connectivity to the Internet. There is a written specification developed, published and promoted by the Bluetooth Special Interest Group (SIG). This SIG includes Agere,…Read more …

Wireless Security

GSM phones use encrypted technology that enables secure voice and data transfer during calls. GSM technology uses an algorithm to ensure the authenticity of the caller and the integrity of the channel, even when you are roaming in a foreign country. The most interesting, and potentially contentious area of wireless security is that concerning wireless LANs or Wi-Fi networks, these are fast becoming the connection method of choice. Wireless signals do not recognize corporate or geographical boundaries and are only limited by the propagation configuration of the network. Even in an office environment…Read more …