SlideShare uma empresa Scribd logo
1 de 9
The technology has evolved with time. With the growth of
technology, there have been made many devices which don’t
need wires to connect to different devices, i.e. they connect
wirelessly. There are many devices that run wirelessly. In
recent times these wireless devices have come into demand and
are trending. We can see these devices almost everywhere.
WIRELESS
TECHNOLOGY
In the history of wireless technology, the demonstration of the theory
of electromagnetic waves by Heinrich Hertz in 1888 was important.
The theory of electromagnetic waves was predicted from the research
of James Clerk Maxwell and Michael Faraday. Hertz demonstrated
that electromagnetic waves could be transmitted and caused to travel
through space at straight lines and that they were able to be received
by an experimental apparatus. The experiments were not followed up
by Hertz. Jagadish Chandra Bose around this time developed an early
wireless detection device and helped increase the knowledge of
millimeter length electromagnetic waves. Practical applications of
wireless radio communication and radio remote control technology
were implemented by later inventors, such as Nikola Tesla.
HISTORY
Portable Computer
Internet Tablet
Smartphone
Wi-Fi
Bluetooth
Radio
TYPES OF WIRELESS
DEVICE OR TECHNOLOGY
A portable computer is a
computer that is designed to be
moved from one place to another
and includes a display and
keyboard. Portable computers,
by their nature, are generally
microcomputers. Portable
computers, because of their size,
are also commonly known as
'Lunchbox' or 'Luggable‘
computers.
A PDA with a web browser is an
Internet tablet, an Internet
appliance in tablet form. It does
not have as much computing power
as a full tablet computer and its
applications suite is limited, and it
can not replace a general purpose
computer. Internet tablets
typically feature an MP3 and video
player, a web browser, and a picture
viewer.
Portable Computer Internet Tablet
TYPES
A smartphone is a mobile phone
with an advanced mobile
operating system which combines
features of a personal computer
operating system with other
features useful for mobile or
handheld use. They typically
combine the features of a cell
phone with those of other popular
mobile devices, such as personal
digital assistant (PDA), media
player and GPS navigation unit.
Marconi did transmit the first
radio signal across the Atlantic.
The term "wireless" came into
public use to refer to a radio
receiver or transceiver (a dual
purpose receiver and transmitter
device), establishing its usage in
the field of wireless telegraphy
early on; now the term is used to
describe modern wireless
connections such as in cellular
networks and wireless broadband
Internet.
Smartphone Radio
TYPES
Wi-Fi is a wireless local area
network that enables portable
computing devices to connect easily
to the Internet. Standardized as
IEEE 802.11 a,b,g,n, Wi-Fi
approaches speeds of some types of
wired Ethernet. Wi-Fi has become
the de facto standard for access in
private homes, within offices, and at
public hotspots.
Bluetooth is a major form of
wireless communication. It is a
simple sharing measure used in
smartphones, personal
computers ,speakers ,etc. it has a
range about 10m and can be
extended up to 100m. It is a
cheap, simple and easy to use
form of wireless communication
Wi-Fi Bluetooth
TYPES
• Mobility – user device can be
moved easily within the wireless
range
• Neat and easy Installation – since
no cable running here and there,
just start up the wireless device
and you’re ready to rumble
• Less cost for cabling infrastructure
and device
• More user supported – cable
device have limited slots whereas
wireless does not.
• Relatively lower bandwidth speed
– example: although currently
802.11/n could reach 128 Mbps,
UTP cable can reach 1 Gbps. And
more user mean each bandwidth
get smaller. That is why currently
wired backbone network is still
preferred.
• Ease of access means more
security also necessary to protect
data and/or bandwidth, since
people can connect anywhere
within range without seeking
network plug.
Advantages Disadvantages
DISTINGUISHING
The swift development of wireless has enabled so many parallel
technologies, increased productivity and even saved countless lives.
The future for wireless looks set to include even more applications
which can give humans an edge. Another positive of this growth is
that wireless technology has gotten really cheap which means that
more people have access to it. Wireless innovations have made the
world a much smaller place!
CONCLUSION

Mais conteúdo relacionado

Mais procurados

Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsDigitalThinkerHelp
 
Latest trends in wireless technology
Latest trends in wireless technology Latest trends in wireless technology
Latest trends in wireless technology Dr. Mazlan Abbas
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Enriquee Guevarra
 
4G technology(Tapas Kumar Palei)
4G technology(Tapas Kumar Palei)4G technology(Tapas Kumar Palei)
4G technology(Tapas Kumar Palei)Tapas Palei
 
The Stages Phases of Internet Development PPT
The Stages Phases of Internet Development PPTThe Stages Phases of Internet Development PPT
The Stages Phases of Internet Development PPTRahul John
 
Trends in communication technology
Trends in communication technology Trends in communication technology
Trends in communication technology awe8some
 
How Media Convergence Works
How Media Convergence WorksHow Media Convergence Works
How Media Convergence Workss1180063
 
The future of the internet
The future of the internetThe future of the internet
The future of the interneticebabyboyz
 

Mais procurados (20)

Wireless communication
Wireless communication Wireless communication
Wireless communication
 
Research paper 2 (1)
Research paper 2 (1)Research paper 2 (1)
Research paper 2 (1)
 
Mobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and ApplicationsMobile Computing and its Advantages, Disadvantages and Applications
Mobile Computing and its Advantages, Disadvantages and Applications
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Latest trends in wireless technology
Latest trends in wireless technology Latest trends in wireless technology
Latest trends in wireless technology
 
The importance of wi fi
The importance of wi fiThe importance of wi fi
The importance of wi fi
 
Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)Wireless communications paper (Ej Guevarra)
Wireless communications paper (Ej Guevarra)
 
Ck sharma
Ck sharmaCk sharma
Ck sharma
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
4G technology(Tapas Kumar Palei)
4G technology(Tapas Kumar Palei)4G technology(Tapas Kumar Palei)
4G technology(Tapas Kumar Palei)
 
The Stages Phases of Internet Development PPT
The Stages Phases of Internet Development PPTThe Stages Phases of Internet Development PPT
The Stages Phases of Internet Development PPT
 
Wireless network presentation
Wireless network presentationWireless network presentation
Wireless network presentation
 
Lifi
LifiLifi
Lifi
 
Trends in communication technology
Trends in communication technology Trends in communication technology
Trends in communication technology
 
How Media Convergence Works
How Media Convergence WorksHow Media Convergence Works
How Media Convergence Works
 
Wifi and its importance
Wifi and its importanceWifi and its importance
Wifi and its importance
 
Lecture 4 telecommunication
Lecture 4 telecommunicationLecture 4 telecommunication
Lecture 4 telecommunication
 
Technology modified
Technology modifiedTechnology modified
Technology modified
 
PRESENTATION
PRESENTATIONPRESENTATION
PRESENTATION
 
The future of the internet
The future of the internetThe future of the internet
The future of the internet
 

Semelhante a Computer wireless trends

Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technologypriyankpatel2811
 
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfMohanVeerabomala
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxMohanVeerabomala
 
Mobile computing
Mobile computingMobile computing
Mobile computingJeha Ryhan
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...FaizanMahmood28
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and180192
 
Final wireless communication
Final wireless communicationFinal wireless communication
Final wireless communicationjingyueyu
 
Wireless technology
Wireless technologyWireless technology
Wireless technologyFatma Ala'a
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Librarysanjay thakur
 

Semelhante a Computer wireless trends (20)

Introduction Wireless Technology
Introduction Wireless TechnologyIntroduction Wireless Technology
Introduction Wireless Technology
 
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdfwirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
wirelesstecfinalppt-141223031757-conversion-gate02 (2).pdf
 
Network technologies.pptx
Network technologies.pptxNetwork technologies.pptx
Network technologies.pptx
 
Wireless
Wireless Wireless
Wireless
 
Wir eless tren dz..
Wir eless tren dz..Wir eless tren dz..
Wir eless tren dz..
 
WIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptxWIRE LESS TECHNOLOGY .pptx
WIRE LESS TECHNOLOGY .pptx
 
Wireless communaction
Wireless communactionWireless communaction
Wireless communaction
 
Wireless communications
 Wireless communications  Wireless communications
Wireless communications
 
Essay On Wireless Technology
Essay On Wireless TechnologyEssay On Wireless Technology
Essay On Wireless Technology
 
Mobile computing
Mobile computingMobile computing
Mobile computing
 
Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...Laiba Arshad ( Introduction to information and communication technology ) ict...
Laiba Arshad ( Introduction to information and communication technology ) ict...
 
Wireless Technology
Wireless TechnologyWireless Technology
Wireless Technology
 
14A81A05A0
14A81A05A014A81A05A0
14A81A05A0
 
The use and importance of radio waves and
The use and importance of radio waves andThe use and importance of radio waves and
The use and importance of radio waves and
 
Final wireless communication
Final wireless communicationFinal wireless communication
Final wireless communication
 
Wireless technology
Wireless technologyWireless technology
Wireless technology
 
44.pptx
44.pptx44.pptx
44.pptx
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
WIRELES NETWORK
WIRELES NETWORKWIRELES NETWORK
WIRELES NETWORK
 
wireless networking and Library
 wireless networking and Library wireless networking and Library
wireless networking and Library
 

Último

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 

Último (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 

Computer wireless trends

  • 1.
  • 2. The technology has evolved with time. With the growth of technology, there have been made many devices which don’t need wires to connect to different devices, i.e. they connect wirelessly. There are many devices that run wirelessly. In recent times these wireless devices have come into demand and are trending. We can see these devices almost everywhere. WIRELESS TECHNOLOGY
  • 3. In the history of wireless technology, the demonstration of the theory of electromagnetic waves by Heinrich Hertz in 1888 was important. The theory of electromagnetic waves was predicted from the research of James Clerk Maxwell and Michael Faraday. Hertz demonstrated that electromagnetic waves could be transmitted and caused to travel through space at straight lines and that they were able to be received by an experimental apparatus. The experiments were not followed up by Hertz. Jagadish Chandra Bose around this time developed an early wireless detection device and helped increase the knowledge of millimeter length electromagnetic waves. Practical applications of wireless radio communication and radio remote control technology were implemented by later inventors, such as Nikola Tesla. HISTORY
  • 5. A portable computer is a computer that is designed to be moved from one place to another and includes a display and keyboard. Portable computers, by their nature, are generally microcomputers. Portable computers, because of their size, are also commonly known as 'Lunchbox' or 'Luggable‘ computers. A PDA with a web browser is an Internet tablet, an Internet appliance in tablet form. It does not have as much computing power as a full tablet computer and its applications suite is limited, and it can not replace a general purpose computer. Internet tablets typically feature an MP3 and video player, a web browser, and a picture viewer. Portable Computer Internet Tablet TYPES
  • 6. A smartphone is a mobile phone with an advanced mobile operating system which combines features of a personal computer operating system with other features useful for mobile or handheld use. They typically combine the features of a cell phone with those of other popular mobile devices, such as personal digital assistant (PDA), media player and GPS navigation unit. Marconi did transmit the first radio signal across the Atlantic. The term "wireless" came into public use to refer to a radio receiver or transceiver (a dual purpose receiver and transmitter device), establishing its usage in the field of wireless telegraphy early on; now the term is used to describe modern wireless connections such as in cellular networks and wireless broadband Internet. Smartphone Radio TYPES
  • 7. Wi-Fi is a wireless local area network that enables portable computing devices to connect easily to the Internet. Standardized as IEEE 802.11 a,b,g,n, Wi-Fi approaches speeds of some types of wired Ethernet. Wi-Fi has become the de facto standard for access in private homes, within offices, and at public hotspots. Bluetooth is a major form of wireless communication. It is a simple sharing measure used in smartphones, personal computers ,speakers ,etc. it has a range about 10m and can be extended up to 100m. It is a cheap, simple and easy to use form of wireless communication Wi-Fi Bluetooth TYPES
  • 8. • Mobility – user device can be moved easily within the wireless range • Neat and easy Installation – since no cable running here and there, just start up the wireless device and you’re ready to rumble • Less cost for cabling infrastructure and device • More user supported – cable device have limited slots whereas wireless does not. • Relatively lower bandwidth speed – example: although currently 802.11/n could reach 128 Mbps, UTP cable can reach 1 Gbps. And more user mean each bandwidth get smaller. That is why currently wired backbone network is still preferred. • Ease of access means more security also necessary to protect data and/or bandwidth, since people can connect anywhere within range without seeking network plug. Advantages Disadvantages DISTINGUISHING
  • 9. The swift development of wireless has enabled so many parallel technologies, increased productivity and even saved countless lives. The future for wireless looks set to include even more applications which can give humans an edge. Another positive of this growth is that wireless technology has gotten really cheap which means that more people have access to it. Wireless innovations have made the world a much smaller place! CONCLUSION