Network can be defined as a system interconnected segment for the purpose of sharing resources; networking can be wireless (a medium of connection that does not use cables) or by use of cables to the sharing resources. In this paper, am going to determine network technology that will be wireless but having many access points. In addition, it will have a high level of security (Kumar, , Manjunath, & Kuri, 2008, P. 24).
To begin with, the technology behind wireless is usually nominated by IEEE 802.11 standards, starting with the original 802.11n, r and s. Non-IEEEWLAN standards are also reviewed, the brevity of this section being clear indication of the dominance of IEEE standards on the local area scale as seen or indicated in the graph. Therefore, when implementing a wireless one needs to set a security password upon which clients are the only people who can know it. This implies that without the security code being alike to the one provided by the used in implementing the wireless, on will not be able to access the network thus security of the network being guaranteed (Rackley, 2007, P.63).
Secondly, implementing a WLANs form the point of view of a medium scale (number of client/users) corporate network, starting the definition of the user and technical requirement, through planning and installation to operation and support. Therefore, technology such as that of encryption and authentication mechanisms of 802.11 is a practical security measure to manage a wireless topology such as the one in the graph (Kumar, , Manjunath, & Kuri, 2008, P. 44).
Last but not least, one may encounter problems implementing the wireless. Therefore, there I usually a troubleshooting that covers the strategies of identifying and diagnosing the problems to enable the sharing connectivity and performance. We all know that the technology of wireless started in 1980’s. Therefore, there have been improvements since then to ensure development of the technique(Rackley, 2007, P.33)..
In conclusion, the extension of 802.11a and 802.11b was majorly based on the concept of increasing the speed on the network. Hence there was the need for PHY layers data that gave the speed of 54mbps; this implies that the client could easily access the wires from different access points provided the client s were inside the scale or the network. In other words, speed of the network determines the sharing ability of the network.