Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Trådlösa nätverk
Jönköping University, School of Engineering, JTH, Computer and Electrical Engineering.
2006 (Swedish)Independent thesis Basic level (degree of Bachelor), 10 points / 15 hpStudent thesis
Abstract [en]

This report describes what wireless local area networks are and the use and configuration of them. These WLAN as they also are called can be used both in new installations and expansion of existing networks. Further on this report reveals security in this area. Security is incredible important in all networks not at least wireless because you don’t have to be in the environment physically to get the information, you only have to be in the coverage area that can be several hundred meters. It also takes up several different standards for wireless LANs. These are more or less topical and while this paper is written new standards are taking form so this really is under development.

The work has been done in co-operation with Koneo Rosenlund where most of this work has been performed. The products that were opted to work with were Linksys products within the 802.11g standard.

The reason for this inquiry was that Koneo had noticed and thought that wireless LANs is the future and because they wanted an environment to show old and new customers and use in their daily work.

I have found that the wireless LAN is an excellent option to the traditional LANs. They are cheap to install, easy to administrate and expand. If someone wants to change office there is no need to draw a new cable or change cables in a switch, just place the computer on the new desk and everything will work as it used to. For most users it’s ok in safety matters to use WLANs but for them with top secret documents or in a hospital where the radio waves can disturb other equipment then it’s a worse alternative.

I think that I fulfilled most of the goals we set up before I started this work. Some part have been fulfilled beyond our expectations and others have been more difficult to solve.

Place, publisher, year, edition, pages
2006.
National Category
Computer Science
Identifiers
URN: urn:nbn:se:hj:diva-518OAI: oai:DiVA.org:hj-518DiVA: diva2:4228
Uppsok
teknik
Supervisors
Examiners
Available from: 2006-08-10 Created: 2006-08-10

Open Access in DiVA

fulltext(334 kB)944 downloads
File information
File name FULLTEXT01.pdfFile size 334 kBChecksum MD5
ffbf2e3901fe667150a30bd4ef7b677f9f80d75041617ef32a79e4a41248dfc9d722097a
Type fulltextMimetype application/pdf

By organisation
JTH, Computer and Electrical Engineering
Computer Science

Search outside of DiVA

GoogleGoogle Scholar
Total: 944 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 553 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf