We accept

Importance Of Cordless Technologies Information Technology Essay

This is a written report which gives a idea of the current state in the field of wireless solutions, which is part of computer networks. The world is currently occupied completely with computer networks. So, wireless networks in particular play a significant role. Cordless data sites normally include Bluetooth and Wi-fi. I intend to focus on these two research wireless systems. This survey mainly targets network security issues and networking alternatives. Also the research will give attention to the current developments in these systems. The record concludes with my task titles that i am interested to develop.

Importance of Cordless Technologies

It is not a secret that wireless technology is among the most model for entertainment, communication and education all over the world today. Now cellular technologies are incredibly very important to us so that we use them within an immense way. It's important to explore the foundation of these technologies (Alley, 2008).

In 1876, Alexander Graham Bell invented the telephone. After 19 years, an initial radio indication was created by an Italian Marconi. By 1903, the first international cordless seminar transpired in Berlin, Germany. Cellular technology have been researched and developed. By 1966, AT&T's Better Mobile Telephone Service (IMTS) to drive a button to talk to initiate automatic dialling. In 1972, a copyright was approved to Bell Labs for his or her Mobile Communications System. That cellular technology resulted handoffs between cell phones. (Alley, 2008).

Research Proposals

1. Bluetooth


Bluetooth is defined as a short-range wireless technology which ommunicates among Internet devices and between devices and the Internet. It transfers data between Internet devices and other computers synchronously.

Bluetooth is the foundation of the PAN (Personal Area Network), providing a way for devices which are close jointly to wirelessly talk to one another. Bluetooth can connect to devices from an estimated selection of 1 to 100 meters, depending on device's electricity. The most effective Bluetooth devices be capable of communicate at ranges which is normally more than 300 toes. Bluetooth is liable to an array of security risks.

Current Research

'Tremendous changes happened in the area of wireless communications, so much so the mobile phone is rapidly turning into an elaborate mobile device capable of more applications than Personal computers. For example, the info rates provided by initial High Speed Downlink Packet Gain access to (HSDPA) extension enable a individual to wirelessly gain access to the web at boosts to 1 1. 8 MBits/second. HSDPA modulation schemes will soon increase this velocity to higher than 10MPieces/second. So installing our latest e-mails with a 5 MB document attachments or more is no more a lengthy exercise'. (Upton, 2006)

Some of the current and future applications will be examined. Some of these developments are helping cordless technology to fine-tune its performance, whilst some are starting Bluetooth up to new software areas.

Toshiba Firm, Tokyo, has arranged Bluetooth and voice recognition technologies collectively in a radio headset to permit users to control consumer electronics, gadgets, and computers by means of spoken instructions while hearing music or the sound from Tv set. 'Consumers have been snapping up digital camera models and digital video recording recorders because of the ease of showing images with friends and family via e-mail. Now, Bluetooth would make moving images to a Personal computer simpler. Sony designed digital movie camera not only with Bluetooth, but the ability to hook up directly to the Internet and never have to use a PC'. (Normile, 2002)

2. WI-FI


WI-FI is nothing but wireless fidelity this means wireless stability or commitment which enables us to connect to several devices wirelessly for data showing purposes. Wireless is a long-distance, movable connectivity technology for individual business or for an absolute geographical area. Many people all over the world use Wi-fi in their homes to connect to anyone with WiFi connected devices.

In personal computers, Wi-Fi replaced standard wired networks between two or more computers. It empowered file copy from server to clients and vice versa without wire connections and other important networking-related hardware. Using Wi-Fi, computer systems share an web connection with minimum use of hardware. WLAN credit cards allow cordless networking among devices; cordless routers help the broadcasting of wireless networking alerts in confirmed area (Wifinotes 2010).

Current Research

Wi-Fi empowered air flights trend is on:

Aircell is currently the leading flight to get in-flight Wi-Fi technology. Three other airlines who have in-flight Wi-Fi service are American Airlines, Delta and Virgin America. Aircell have Wi-Fi service in almost all of their planes and they are planning to have wireless service in all their planes (wifinotes, 2010).

Voice-over-Wi-Fi service:

Voice-over-Wi-Fi service is now more popular in business situations. Research in Movement announced a fresh version of its Mobile Speech System (MVS) which helps voice-over-Wi-Fi calling. MVS is installed in businesses and allows workers to work with their contact number and extension using their smart devices. 'By including words over Wi-Fi, business users can make and get office phone calls via their devices more than a Wi-Fi connection, lowering on long-distance, international-roaming and even mobile wireless charges' (Luna, 2010)

Evaluation Of research proposals.

Security issues of both Bluetooth and WI-FI.

Bluetooth offers various benefits and advantages. Though organizations should never only address the security threats but also the situation of the devices participating in the Bluetooth networks. Specially, organizations need to address security concerns for level of privacy, data consistency, and network ease of access. This section briefly addresses some of the potential risks to security, i. e. episodes on privacy, stability, and network accessibility. Attacks on privacy mean a lack of confidentiality which is receiving home elevators Bluetooth that a malicious user should not access. Data Trustworthiness attacks are nothing but loosing data integrity. Integrity dangers involve the change of, addition, or deletion of information, which is then exceeded through the network without the user's or network administrator's knowledge. For example, a malicious consumer might use an untrusted device, such as a PDA, to access the address booklet of another PDA or laptop.

'The major concerns of users at Wi-Fi hotspots aren't having the ability to connect and security. These kinds of wireless networks are usually not secure'. Many Wi-Fi hotspot users do not understand the issues related to general population wireless networks, and they also do not take any steps to ensure their personal documents, personal privacy and personality are safe' (Geier, 2006).

Security Solutions of both Bluetooth and Wi-fi.

Solutions and security methods for the Bluetooth include

Management Alternatives: To supply a sufficient degree of knowledge for many who will deal with Wireless PAN (WPAN) and Bluetooth allowed devices & systems.

Operational Alternatives:' Establishing spatial distance requires power requirements low enough to prevent a tool operating on the organizations premises from having sufficient capacity to be detected exterior physical restrictions. This spatial distance in place creates a far more secure boundary'. (Tom karygiannis, Les Owens, Nov 2002)

Technical Alternatives: Much like WLANs and Bluetooth technical solutions fall under one of two categories: software security solutions and hardware security alternatives. Bluetooth software solutions give attention to Personal Identification Quantity (PIN) and private authentications, while hardware alternatives involve the utilization of the Bluetooth device address and link keys which stay at the hyperlink level. (wifinotes, 2010)

WI-FI security alternatives include

Secure real-Time Traffic using Virtual Private Network (VPN) Interconnection.

Disable writing of data files, folders and services you might not want others to view, use or modify.

Use Personal Firewall Software.

Keep Up-to-Date of functioning system

(Eric Geier, 2006)


Finally, this report eventually ends up with my job game titles where I am interested to build up is "WI-FI CAMPUS", "VIRTUAL CLASS ROOM" and "WI-FI HOTEL". In my proposed projects, I'd like to triumph over all security issues experienced by existing systems and provide solutions for the prevailing systems.

Examples of completed orders
More than 7 000 students trust us to do their work
90% of customers place more than 5 orders with us
Special price $5 /page
Check the price
for your assignment