logo

Wireless Networking: Comparative Analysis and Configuration

   

Added on  2023-06-04

10 Pages1409 Words156 Views
 | 
 | 
 | 
Running head: WIRELESS NETWORKING
Wireless Networking
Name of the Student
Name of the University
Author’s Note
Wireless Networking: Comparative Analysis and Configuration_1

1
WIRELESS NETWORKING
Part A: Comparative Analysis
Q 1 Answer:
The Near filed communication and the radio frequency identification can be used for
different purpose in the network and helps in increasing the efficiency of the workplace of the
organization. RFID technology is mainly applied for maintaining a track package and
inventory and it enables a control on the current business process. The radio waves are used
for communication and NFC has evolved from the RFID and used for enabling secure
communication between the sender and the receiver. The operating range of NFC is 4 inches
and can be used for one or two way communication. NFC smart tags are used in the smart
phone for short distance communication. In case of RFID, it consists of a memory chip for
storing the data and an antenna and for getting the data from the memory chip a RFIS reader
is needed. The RFID tags are used in wide range of application such as in retail products for
tracking the inventory. It also finds its application in the toll for identification of the car and
create bills. It can operate from a larger distance than the NFC. It is a one way
communication and the data in the memory chip flows using the RFID reader.
There are two different types of RFIS tags such as passive and active tag where the
active tag is powered using their own power source and has its ability to broadcast the
information to the reader for a distance of 100m. It is an ideal choice for the industrial
application and management of the assets and improvement of the logistics. The passive
RFID have no source of power and they are powered when an electromagnetic wave is
transmitted from the reader. It can operate at a distance of 25 meter since the radio waves are
strong enough to provide power to the RFID tags.
Wireless Networking: Comparative Analysis and Configuration_2

2
WIRELESS NETWORKING
The NFC and the RFID operates at the same frequency and have the similar protocol
and standards. The advantage of the NFC is that it operates in short range and thus become a
secure choice for communicating the data packets. The risk of man in the middle attack is
eliminated for the NFC and it uses peer to peer communication such that the NFC device can
act both as a reader or tag. Due to the security options provided by the NFC it becomes an
ideal choice for using it for contact less payment. It can also be used for sharing of
information and small files between the two NFC enabled devices.
Q 2 Answer:
For the configuration of the wireless network a switch is connected with two generic
wireless access point and two laptop Pcs are used for connecting it with each of the access
point. The access points are configured with an secure passphrase for controlling the
authentication of the user. The WPA2-PSK encryption algorithm is used with a combination
Wireless Networking: Comparative Analysis and Configuration_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents