Академический Документы
Профессиональный Документы
Культура Документы
Dependability of Delivery:
All messages are guaranteed of accurate and full
transmission.
Notification:
Notifies the user that there is data that has been sent and
Connectivity Options:
Send and receiver are given a wide range of options not
only in hardware for the portable device, but also are given
options in receiving messages (choosing a type of
connection for instance).
Millions of Users:
Ability to engage millions of users.
Priority Alerts:
Able to distinguish between messages and data that are of
Host Reconfiguration:
The ability to reconfigure when changing environments.
For example, Person A is carrying a Palm Pilot that uses
Bluetooth.
Person A enters the office where there is an entire Bluetooth
network set-up and Person As Palm Pilot configures to the
settings of the office network.
The end of the day comes, and Person A starts driving home.
Person A gets home and walks inside where Person As home is
set up with an entirely different Bluetooth network.
Person A brings the Palm Pilot out and the Palm Pilot
automatically reconfigures itself to the settings of the Bluetooth
network in Person As home.
Therefore, whether the Palm Pilot works in one environment and
can detect when it has been moved to another environment and
can set itself up wherever it is located.
Host Mobility:
One host contains its settings on a network its IP
Web Model.
There is also an Origin Server with a Gateway.
Again the Origin Server contains content and scripts,
while the Gateway acts as a server to the Clients.
The Gateway uses the proxy.
In the WAP Model, the Client, for example, could be a
mobile phone.
The Client makes a request in WML or in HDML
depending on the device and request, and the Gateway
will encode the request to the Origin Server and once
the Origin Server responds with information to send, it
sends the data back through the Gateway, where the
Gateway will encode the information again, and send it
mobile phone.
That is, his phone has WAP features on it such as a small email
application and a mini browser.
He decided to view something on his mini browser, thus requesting to
see data.
The request is passed to the WAP Gateway of his mobile service
network, where their servers retrieve the information in standard HTML
format or perhaps even in WML if the server can make the translation
through a filter in the WAP Gateway.
One the request is sent through the WAP Gateway, the WAP Gateway
high performance.
Intel originally developed and released PCI in 1993, and it satisfies the
needs of the recent generations of PCs for multimedia and graphics.
PCI cards were the first to popularize "plug-and-play" technology, which
makes it easy to install the NIC.
PCI circuitry can recognize compatible PCI cards and work with the
computer's operating system to set the configurations for each card.
PC Card
The PC Card was developed in the early 1990s by the Personal
Authentication
Most access controllers have a built-in database for authenticating
users; however, some offer external interfaces to authentication servers
such as Remote Authentication Dial-In User Service (RADIUS) and
Lightweight Directory Access Protocol (LDAP).
For smaller, private networks, an internal database might suffice. For
enterprise solutions, however, external and centralized authentication
servers provide better results.
Encryption
Some access controllers provide encryption of data from the client to the
server and back, using such common methods such as IPSec.
This provides added protection beyond what the native wireless network
standard provides. Some of these features, however, are also part of
web browsers.
Subnet Roaming
In order to support roaming from one network to another, access
controllers provide roaming across subnets without needing to reauthenticate with the system.
As a result, users can continue utilizing their network applications
without interruption as they roam about a facility.
This feature is especially useful for larger installations where access to
the network for specific users will span multiple subnets.
Bandwidth Management
Because users share bandwidth in a wireless network, it's important
to have a mechanism to ensure specific users don't hog the
bandwidth.
Access controllers provide this form of bandwidth management
through the assignment of user profiles based on required QoS
levels.
A profile specifies the types of services, such as web browsing, email, and video streaming, as well as performance limits.
For example, an unsubscribed visitor attempting to utilize a public
wireless LAN could classify as fitting a "visitor" profile, which might
only allow access to information related to the local hotspot.
A subscriber, however, could have a different role that allows him to
have a broadband Internet connection.
Wireless Medium
The wireless medium (WM) is used for the actual transfer
Access Point
The access point (AP) is a type of STA. Specifically, it helps
infrastructure BSS.
A third, but unofficial, topology type exists, called a
wireless distribution system (WDS).
Its unofficial because it is not officially sanctioned or
described in the 802.11 specification, and neither is it
sanctioned by the Wi-Fi Alliance special interest group.
Frequency-hopping
spread
spectrum (FHSS)
Orthogonal frequency
division multiplexing
(OFDM)
Extended rate
PHY (ERP)