Wi-Fi is a technology that allows the interchange of data and connection to the internet using radio waves. The name Wi-Fi was a brand name which in English is a synonym of the word "WLAN" (Wireless Local Area Network). The Institute of Electrical and Electronic Engineers (IEEE) defines it as any WLAN products on their 802.11 standards that complete the Wi-Fi Alliance interoperability certification test may only use the “Wi-Fi Certified” Trademark. As of today, more and more devices are starting to use the Wi-Fi technology like laptops, Smartphones, and other media devices. This is by connecting a device through a hotspot at home or in different places. (Wikipedia, the Free Encyclopedia) The idea about Wi-Fi started in 1985 when Federal Communications Commission (FCC), an American Telecommunication Regulator decided to open several bands of wireless spectrum after the government allowed them to use it without a licence. Over several years, an engineer namely Michael Marcus took three spectrums from the industrial, medical and scientific bands and leaked it to communication entrepreneurs. (Wil Corp. Inc, 2004) In 1991, NCR Corporation/AT&T in Nieuwegein, Netherlands invented a precursor to Wi-Fi which was intended for the system of cashing. The first wireless devices/products were brought on the market with the name “WaveLAN”. A Dutch engineer, Vic Hayes named ‘father of Wi-Fi’ was with his team designing other Wi-Fi standards. Wi-Fi was used on the market as early as the year 2000 by the company called Interbrand Corporation, were hired by the Wi-Fi Alliance to think of a name that people will like. It was Phil Belanger, a founding member of the Wi-Fi Alliance selected the name “Wi-Fi” (a play for the term “Hi-Fi”) and created the...
... middle of paper ...
...art also serves as a background, concerning the regularity of the proponents’ usage of a given gadget in accessing to Wi-Fi. The last part is on the proponents’ observation on the quality of Wi-Fi in certain places. The responses of these 50 De La Salle Lipa college students serve as the first-hand data of this study.
Works Cited
Carter, T. (2005). Wireless Connection. Wireless For Dummies, p. 406
Broadband: What affects your Wi-Fi signal. (2013). Retrieved 2014, from Zen: Broadband: What affects your Wi-Fi signal
Kessler, T. (2011). Diagnosing and Addressing Wi-Fi Signal Quality Problems, CNet
Mitchell, B. (2013). Why Do Wi-Fi Connection Speeds Keep Changing? Wireless Networking .
Rainer, R., & Cegielski, C. (2013). Introduction to Information Systems. London: John Wiley and Sons Inc.
Williams, B., & Sawyer, S. (2013). Using Information Technology. McGraw Inc.
New York: Random House, 2001. Web. The Web. The Web. http://site.ebrary.com/lib/priority/docDetail.action?docID=10235241>. Buchanan, Albert Russell.
...6. Fisher Center for Information Technology & Management, University of California in Berkeley. June 1995
Wi-Fi services are economical to the community, since they provide internet services as utility to the whole community rather than concentrating on a few individuals. They are also much cheaper than having individual businesses and households paying private firms to acquire internet network services, which are in this case availed to the community at no cost or at very low charges. Apart from its economic advantage, Wi-Fi technology is also capable of enhancing a municipality’s management and public safety , especially when used directly. In addition, Wi-Fi is viewed as a social ...
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
Brookshear, J. G., Smith, D. T. and Brylow, D. (2011) Computer Science: An Overview. 11th ed. Prentice Hall / ADDISON WESLEY Publishing Company Incorporated. Available at: http://books.google.com/books?id=LbtoewAACAAJ.
The word Bluetooth is taken from the 10th century Danish King Harald Bluetooth. King Bluetooth had been influential in uniting Scandinavian Europe during an era when the region was torn apart by wars and feuding clans. Nowadays, Bluetooth technology is the implementation of a protocol defined by the IEEE 802.15 standard. The standard defines a wireless personal-area network (PAN) operable in an area the size of a room or a hall.
By transmitting signals at 2.4 or 5 GHz, it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem, and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires (Cox).
Introduction: This is a 21th century, technology is the most important and improved thing of the human life. It makes life easier and faster. Development of faster sophisticated technology we have better and fast life. So all we are connect each other by computer network. There are two different way of network: Wired and wireless. Now day we can found network almost everywhere. Home, business, public place, Airport, Planes, hospitals, school, train everywhere we can found networking. Therefore, almost every sector of the economy that has affected by wired and wireless technology. Wired network and wireless protect both has security, But in general wireless network is less secure than wired networks. For proper security AP (access point) and its antenna should be right position. Also add a wireless access point or use a wireless router we can connect to network wirelessly. AS we using more and more of devices (smart phones, tablet and computers) rely on wireless networking, we have to improve our network security too.
Zeleny, M (ed.) 2000, The IEBM handbook of information technology in business, Thomson Learning, London.
Mehdi Khosrow-Pour, D.B.A. 2006, Cases on information technology : lessons learned,Vol 7, Hershey, Pa. : Idea Group.
Stair, R. M. (2008) Fundamentals of business information systems, Australia; United Kingdom: Course Technology CENGAGE Learning.
Laudon C. & J. Laudon (2003: 5th edition) Essentials of Management Information Systems. London: Prentice Hall International Limited
Magal, S. R., PhD, & Word, J. (2009). Essentials of Business Processes and Information Systems. Hoboken, NJ: John Wiley & Sons.
Paige B., Brian D. and Cameron W. (2012). Business Driven Information Systems, 3rd Canadian Ed. 300 Water St, Whitby, ON L1N 9B6, McGraw Hill Ryerson Ltd
The survey was completed on 18 March by 55 respondents. It is possible to draw conclusions from 55 people, but more students are needed to obtain better findings. Most of the respondents said they are satisfied with their mobile phone type. The majority of respondents were aged 13 to 19...