Assignment #2
Assignment #2
Connectivity:
- Fixed Network: In a fixed network, devices are connected through physical cables,
such as Ethernet cables or fiber-optic cables. These cables establish a stable and
reliable connection between devices.
- Wireless Network: In a wireless network, devices connect to the network using radio
waves or infrared signals. There is no need for physical cables, providing more flexibility
and mobility.
Mobility:
- Fixed Network: Devices in a fixed network are generally stationary and do not have
the ability to move around freely without losing the connection. For example, desktop
computers connected via Ethernet cables.
- Wireless Network: Devices in a wireless network have the ability to move around
freely while staying connected. Examples include laptops, smartphones, and other
portable devices connected via Wi-Fi.
Infrastructure:
- Fixed Network: Fixed networks require physical infrastructure such as cables, routers,
switches, and access points to provide connectivity. These networks are usually installed
and managed by professionals.
- Wireless Network: Wireless networks depend on access points or routers that
transmit and receive signals wirelessly. These networks are easier and quicker to deploy
in different locations.
Speed and Bandwidth:
- Fixed Network: Fixed networks generally offer higher speeds and bandwidth
compared to wireless networks. Fiber-optic cables, for example, can provide extremely
fast speeds.
- Wireless Network: Wireless networks have lower speeds and bandwidth compared to
fixed networks due to limitations in wireless technology. However, advancements in
wireless standards (like Wi-Fi 6) have significantly improved wireless speeds.\
Security:
- Fixed Network: Fixed networks are generally considered more secure because the
physical nature of the connection makes it harder for unauthorized access. However,
proper security measures such as firewalls and encryption are still necessary.
- Wireless Network: Wireless networks are more vulnerable to unauthorized access
and attacks if not properly secured. Encryption protocols like WPA2 or WPA3 are
commonly used to enhance security in wireless networks.
2. What are the advantage and disadvantage of Mobile Computing Technology?