Get the complete project »
- The Complete Research Material is averagely 52 pages long and it is in Ms Word Format, it has 1-5 Chapters.
- Major Attributes are Abstract, All Chapters, Figures, Appendix, References.
- Study Level: BTech, BSc, BEng, BA, HND, ND or NCE.
- Full Access Fee: ₦4,000
Computer have been since the turn of the century and have their impart felt than in the area of information technology (i.e) information is the area to the growth and success of organization. It is the essential ingredient making. As a result of increase in growth in the need to improved information in relent year.
Gradually emphasis is shifting from manual to the electronic method of date transmission information system. The need for an efficient network in an organization cannot be over emphasized.
The project will analyses the viability of a local area network and the component required for the network design, their specification as well as the Important steps to be taken in their installation step to be taken in their installation and management.
Wireless Local Area Network (WLAN) have moved quickly to the mainstream and found in many educational institution, home, business and public area organization and consumers have been to take advantage of the flexibility adding wireless network can offer. A recent report from in-stall predicts that the wireless market will grow from 140 million wireless chipset a year 2005 to 430 million 2009. The emergence of new security standards has also increase confidence in WLANS. Users are becoming more familiar with the technology are caressingly expecting wireless access to be available.
A wireless Local Area network (WLAN) is told or more computers joined together using radio frequency (RF) transmission. This differs from a wired LAN which uses ladling to link together computer in a room, building, or site to from a network.
Although WLAN can be independent, they are more typically an extension to a conventional wired network they can allow user to access and share data , application , internet access or other network resource in the same way as wired network.
Wired LAN are typically used with wireless enable mobile device such notebook computer, PDSS, and tablet PCS .This allow user to take advantage of the flexibility, convenience and portability that WLANS can provide. Wireless networking is also appearing on other device such as mobile phone, digital cameras, handheld game consoles and other consumer electronic.
1.2 STATEMENT OF THE PROBLEM
It is very typical in every industry that as its client base continuous to grow the industry takes increase number of problems. In wireless networking such problems may likely to be poor network strength, no signal when the network is down, devices will only operate at a limited distance from an access point, with the distance largely determined by the standard used. And also network hacking etc.
1.3 SIGNIFINACE OF THE STUDY
Wireless network are now ubiquitous and a large number of institutions incorporated a wireless network in to their infrastructure. Wireless LAN will benefit the people and institution through the following ways:
Wireless network can be used by institutions or people to set and share data quickly whether it be in a small office building or across the world.
Through the use of wireless network, information could be sent behind enemy’s lines easily, efficiently and more reliably.
SCOPE OF THE STUDY
Wireless network renders the potent means for those people who intend to communicate by means of internet. This project is focused on wireless LAN and associated wireless technology.
LIMITATION OF STUDY
The various limitations encountered here can be broadly categorized under the following headings:
Hiding the content or the nature of a communication code, encryption an identity base.
Interference from other devices.
Lack of high quality media streaming.
Hiding the fact that communication takes place.
DEFINITION OF TERMS
WIRELESS: This is a transmission media in which data is being transmitted without using any cable.
ROUTERS: A router is an internet working device that forwards packets between networks by processing the routing information included in the packet.
BANDWIDTH: It refers to the data carrying capacity of a channel of medium.
THE WEB: This is a way of accessing information over the medium of the internet. It is an information sharing model that is built on top of the internet.
FIREWALL: A firewall is a network device for controlling security and access rule.
INTRANET: An intranet is a private computer network that uses internet protocols, network connectivity and possibly the public telecommunication system to securely share part of organizations information or operators with its employers.
NOISE ABSORPTION: It refers to susceptibility of the media to external electrical noise that cause distortion of data signal.
INFRASTRUCTURE MODE: It is used to connect computer with wire network adapters, also known as wireless clients, to an existing wired network with the help from wireless router or access point.
APHOC MODE: It is used to connect wireless clients directly together, without the need for a wireless router or access point.
MICROWAVE: Are electromagnetic wave having frequencies between 1GHZ and 300 GHZ.
SWITCHES: A network switch is a device that forwards and filters OS layer 2 data grams between ports based on the MAC address in the packets.
COMMUNICATION PROTOCOL: This is a set of rules for exchanging information over network links.
You either get what you want or your money back. T&C Apply
Share a Comment
You can find more project topics easily, just search
SIMILAR COMPUTER SCIENCE FINAL YEAR PROJECT RESEARCH TOPICS
» CHAPTER ONE INTRODUCTION 1.1 BACKGROUND TO THE STUDY During the last two decades education institutions have invested heavily in information and commu...Continue Reading »
52 pages | 193 hits | Source: COMPUTER SCIENCE
» 1.0 INTRODUCTIONThe interconnection of computer with other related office equipments are finding increasing application in almost all field of human e...Continue Reading »
50 pages | 151 hits | Source: COMPUTER SCIENCE
» ABSTRACT Land terrain and environmental contributors’ data are used extensively to predict propagation conditions, to optimally select locations...Continue Reading »
54 pages | 451 hits | Source: COMPUTER SCIENCE
» CHAPTER ONEINTRODUCTIONAccording Jantz (2001) the emergence of computer based information system has changed the world a great deal, both large and sm...Continue Reading »
50 pages | 385 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE 1.0 INTRODUCTION Generally, computer has played an important role in global economy in various ways. The Computer is used in many differen...Continue Reading »
55 pages | 431 hits | Source: COMPUTER SCIENCE
6. DESIGN AND IMPLEMENTATION OF COMPUTER SECURITY: DATA ENCRYPTION, DECRYPTION AND KEY HASH ALGORITHMS» ABSTRACTComputer security is a process of protecting computer system and information from harm and unauthorized use. The most important security tool ...Continue Reading »
60 pages | 630 hits | Source: COMPUTER SCIENCE
7. DESIGN AND IMPLEMENTATION OF INTEGRATED SOFTWARE SUIT FOR ACADEMIC PLANNING UNIT (A CASE STUDY OF IMO STATE UNIVERSITY OWERRI)» ABSTRACT The formulation of a good academic planning is only the first implementation putting the academic program plan into action. this requires tha...Continue Reading »
52 pages | 0 hits | Source: COMPUTER SCIENCE
» The principal objective of this project is to help Security Information Systems (SIS) especially NIGERIAN POLICE which is my case study in the area th...Continue Reading »
50 pages | 344 hits | Source: COMPUTER SCIENCE
» CHAPTER ONE1.0 INTRODUCTION1.1 BACKGROUND OF STUDYBig data broadly refers to the new methods and technologies for collecting, managing, and analyzing ...Continue Reading »
53 pages | 332 hits | Source: COMPUTER SCIENCE
» CHAPTER ONEINTRODUCTION1.0 IntroductionThis chapter presents the introduction to the research study under the following headings:Theoretical Backgroun...Continue Reading »
65 pages | 359 hits | Source: COMPUTER SCIENCE