11.07.2015 Views

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

Encyclopedia of Computer Science and Technology

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

wireless computing 513the encyclopedia. One tool, WikiScanner, searches for <strong>and</strong>compiles information (such as affiliations) about wiki contributors,allowing readers to better judge their competence<strong>and</strong> motivations. Wikipedia’s parent Wikimedia Foundationis also introducing a system by which previouslyunknown contributors will undergo a sort <strong>of</strong> probationaryperiod while their material is scrutinized. (Eventually theywould become “trusted” <strong>and</strong> their material would appearinstantly, as it does now for most articles.)Wikis have, like blogs, become a pervasive form <strong>of</strong>online communication <strong>and</strong> information sharing, <strong>and</strong> havegained considerable attention as an application for the“new” Web (see user-created content, Web 2.0 <strong>and</strong>beyond, <strong>and</strong> social networking). Wikis are currentlybeing used to create rapidly exp<strong>and</strong>ing knowledge bases(such as for technical support), to share emerging scholarship,<strong>and</strong> to promulgate documentation within an organization.Hosting services (called “wiki farms”) such as Wikia<strong>of</strong>fer communities wiki s<strong>of</strong>tware <strong>and</strong> Web space, sometimesfree <strong>of</strong> charge. Wiki principles are also finding their wayinto s<strong>of</strong>tware such as personal information managers (seecontent management).Further ReadingComparison <strong>of</strong> Wiki S<strong>of</strong>tware. Available online. URL: http://en.wikipedia.org/wiki/Comparison_<strong>of</strong>_wiki_s<strong>of</strong>tware.Accessed May 11, 2007.Ebersbach, Anja, Markus Glaser, <strong>and</strong> Richard Heigl. Wiki: WebCollaboration. New York: Springer, 2005.Giles, Jim. “Wikipedia 2.0: Now with Added Trust.” NewScientist.com News Service. Available online. URL: http://technology.newscientist.com/channel/tech/mg19526226.200-wikipedia-20%20-now-with -added-trust.html. Accessed December 4,2007.Klobas, Jane. Wikis: Tools for Information Work <strong>and</strong> Collaboration.Oxford: Ch<strong>and</strong>os Publishing, 2006.Lee, Ellen. “As Wikipedia Moves to S.F., Founder DiscussesPlanned Changes.” San Francisco Chronicle, November 30,2007. Available online. URL: http://www.sfgate.com/cgi-bin/article.cgi?f=/c/a/2007/11/30/BUOMTKNJA.DTL. AccessedDecember 3, 2007.Leuf, Bo, <strong>and</strong> Ward Cunningham. The Wiki Way: Quick Collaborationon the Web. Reading, Mass.: Addison-Wesley, 2001.MediaWiki. Available online. URL: http://www.mediawiki.org.Accessed December 4, 2007.Wikipedia. Available online. URL: http://www.wikipedia.org.Accessed December 4, 2007.Woods, Dan. Wikis for Dummies. Hoboken, N.J.: Wiley, 2007.wireless computingUsing suitable radio frequencies to carry data among computerson a local network has several advantages. The trouble<strong>and</strong> expense <strong>of</strong> running cables (such as for Ethernet) inolder buildings <strong>and</strong> homes can be avoided. With a wirelessLAN (WLAN) a user could work with a laptop on the deckor patio while still having access to a high-speed Internetconnection.Typically, a wireless LAN uses a frequency b<strong>and</strong> witheach unit on a slightly different frequency, thus allowingall units to communicate without interference. (Althoughradio frequency is now most popular, wireless LANs canalso use microwave links, which are sometimes used as analternative to Ethernet cable in large facilities.)Usually there is a network access point, a PC that containsa transceiver <strong>and</strong> serves as the network hub (it mayalso serve as a bridge between the wireless network <strong>and</strong> awired LAN). The hub computer can also be connected toa high-speed Internet service via DSL or cable. It has anantenna allowing it to communicate with wireless PCs upto several hundred feet away, depending on building configuration.Each computer on the wireless network has an adapterwith a transceiver so it can communicate with the accesspoint. The adapter can be built-in (as is the case with someh<strong>and</strong>held computers), or mounted on a PC card (for laptops)or an ISA card (for desktop PCs) or connected to aUSB port.Simple home wireless LANs can be set up as a “peer network”where any two units can communicate directly witheach other without going through an access point or hub.Applications needing Internet access (such as e-mail <strong>and</strong>Web browsers) can connect to the PC that has the Internetcable or DSL connection.A wireless LAN can make it easier for workers who haveto move around within the building to do their jobs. Examplesmight include physicians or nurses entering patientdata in a hospital or store workers checking shelf inventory.ProtocolsSeveral protocols or st<strong>and</strong>ards have been developed forwireless LANs. The most common today is IEEE 802.11b,also called WiFi with speeds up to 11 mbps (megabitsper second) transmitting on 2.4 GHz (gigahertz) b<strong>and</strong>.Although that would seem to be fast enough for mostapplications, a new alternative, 802.11n, can <strong>of</strong>fer speedsup to 54 mbps. Because it uses the unlicensed 5 GHzfrequency range it is not susceptible to interference fromother devices.The question <strong>of</strong> security for 802.11 wireless networkshas been somewhat controversial. Obviously, wirelessdata can be intercepted in the same way that cell phone orother radio transmissions can. The networks come with asecurity feature, WEP or the newer WPA, but many usersneglect to enable it, <strong>and</strong> it is vulnerable to certain types <strong>of</strong>attack. Users can obtain greater security by reducing emissionsoutside the building, changing default passwords<strong>and</strong> device IDs, <strong>and</strong> disabling DHCP to make it harderfor snoopers to obtain a valid IP address for the network.Users can also add another layer <strong>of</strong> encryption <strong>and</strong> possiblyisolate the wireless network from the wired networkby using a more secure Virtual Private Network (VPN).Many <strong>of</strong> these measures do involve a trade<strong>of</strong>f between thecost <strong>of</strong> s<strong>of</strong>tware <strong>and</strong> administration on the one h<strong>and</strong> <strong>and</strong>greater security on the other. However, the growing popularity<strong>of</strong> wireless access should spur the development <strong>of</strong>improved built-in security.Another wireless protocol called Bluetooth has beenembedded in a variety <strong>of</strong> h<strong>and</strong>held computers, appliances,<strong>and</strong> other devices. It provides a wireless connection atspeeds up to 1 MB/second (see Bluetooth).

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!