a day it is very easy to establish communication from one part of the world to
other. Despite this even now in remote areas villagers travel to talk to family
members or to get forms which citizens in-developed countries an call up on a
computer in a matter of seconds. The government tries to give telephone connection
in very village in the mistaken belief that ordinary telephone is the cheapest
way to provide connectivity. But the recent advancements in wireless technology
make running a copper wire to an analog telephone much more expensive than the
broadband wireless Internet connectivity. Daknet, an ad hoc network uses wireless
technology to provide digital connectivity. Daknet takes advantages of the existing
transportation and communication infrastructure to provide digital connectivity.
Daknet whose name derives from the Hindi word "Dak" for postal combines
a physical means of transportation with wireless data transfer to extend the internet
connectivity that a uplink, a cyber café or post office provides.
time communications need large capital investment and hence high level of user
adoption to receiver costs. The average villager cannot even afford a personnel
communications device such as a telephone or computer. To recover cost, users
must share the communication infrastructure. Real time aspect of telephony can
also be a disadvantage. Studies show that the current market for successful rural
Information and Communication Technology (ICT) services does not appear to rely
on real-time connectivity, but rather on affordability and basic interactivity.
The poor not only need digital services, but they are willing and able to pay
for them to offset the much higher costs of poor transportation, unfair pricing,
and corruption. It is useful to consider non real-time infrastructures and applications
such as voice mail, e-mail, and electronic bulletin boards. Technologies like
store- and forward or asynchronous modes of communication can be significantly
lower in cost and do not necessarily sacrifice the functionality required to deliver
valuable user services. In addition to non real-time applications such as e-mail
and voice messaging , providers can use asynchronous modes of communication to
create local information repositories that community members can add to and query.
Advances in the IEEE 802 standards
have led to huge commercial success and low pricing for broadband networks. These
techniques can provide broadband access to even the most remote areas at low price.
Important considerations in a WLAN are
In a WLAN, access is not limited to the wired PCs but it is also open to all the
wireless network devices, making it for a hacker to easily breach the security
of that network.
WLAN should have optimum coverage and performance for mobile users to seamlessly
roam in the wireless network
Minimize the interference and obstruction by designing the wireless network with
proper placement of wireless devices.
Choose a wireless technology standard that would make the WLAN a truly interoperable
network with devices from different vendors integrated into the same.
WLAN should provide reliable network connection in the enterprise network.
A manageable WLAN allows network administrators to manage, make changes and troubleshoot
problems with fewer hassles. Wireless data networks based on the IEEE 802.11 or
wifi standard are perhaps the most promising of the wireless technologies. Features
of wifi include ease of setup, use and maintenance, relatively high bandwidth;
and relatively low cost for both users and providers.
combines physical means of transportation with wireless data transfer to extend
the internet connectivity. In this innovative vehicle mounted access points using
802.11b based technology to provide broadband, asynchronous, store and forward
connectivity in rural areas.
You may also like this : Self Defending Networks, Semantic Web, Computer Intelligence Application, Cooperative Linux, Longhorn, Mesh Radio, Parallel Virtual Machine, Linux Virtual Server, Location Independent Naming, PHANToM, Multiprotocol Label Switching, Next Generation Secure Computing Base, NGSCB, Reconfigurable computing, Sky X Technology, Smart Client Application Development using .NET, Spawning Networks, SPCS, Speed protocol processors, Strata flash Memory, Swarm Intelligence, The Callpaper Concept, IP spoofing, Internet Access via Cable TV Network, Face Recognition Technology, FireWire, Param 10000, The Deep Web, Virtual Campus, VoiceXML, Wireless USB, Refactoring, On-line Analytical Processing (OLAP), Pivot Vector Space Approach in Audio-Video Mixing, MPEG-7, Adding Intelligence to Internet, Silverlight,DNA chips, Remote Administration Trojan's, Thermography, AJAX , Alternative Models Of Computation, Amorphous Computing and Swarm Intelligence, Windows DNA, Laptop Computer, Intelligent Software Agents, Self-Managing Computing, Hurd, Intel Centrino Mobile Technology, Computer Seminars Reports and PPT