1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Crank
3 years ago
14

What is the IEEE 802 standards name for a wireless network that is limited to one person's workspace?

Computers and Technology
1 answer:
dalvyx [7]3 years ago
5 0

Answer:

WPAN ( wireless personal area network )

Explanation:

a. PAN ( personal area network )

This network is limited to the work place of a single person. Hence, the name given as personal area network. The devices connected by PAN belong to the range supported by the technology used to implemented the personal area network.

The devices present in this type of work place are connected to each other through PAN. PAN can connect computer, mobile and other technological devices which support PAN.

The data is transferred among these devices through PAN.

Both wireless and wired networks can be used to implement PAN. Wired PAN is achieved by using USB. Wireless PAN uses various technologies which are discussed below.

b. WPAN ( wireless personal area network )

The wireless PAN covers only short distance and hence requires low power.

The distance can range from few centimetres to few meters.

IEEE 802 has described the technologies and standards for each type of network. This network is implemented mainly by technologies such as Bluetooth, wireless USB, IrDA.

1. Bluetooth uses radio waves of short waves. Devices like keyboard, mobile phones, personal digital assistant ( PDA ) use this technology to communicate.

WPAN implemented using Bluetooth is known as piconet. It can connect up to 8 devices. Among them, one is the master device while rest devices become the slaves.

The range of such a network varies from 10 meters to 100 meters.

2. IrDA stands for Infrared Data Association. This technology uses infrared light. Examples using this technology include printers and scanners.

Plugging in

i. Devices supporting WPAN can only communicate with each other when they are within the supported range or distance from each other.

ii. In addition, these devices should have the capability to block devices which will cause unnecessary interference or are not authorized to gain information.

You might be interested in
When doing a Risk assessment, what is one of the most important things to do?
GaryK [48]

Answer:

Determine who might be harmed and how.

8 0
2 years ago
Read 2 more answers
Who was the creator of the game Fnaf?
Lisa [10]
"Scott Cawthon" did that.........
8 0
3 years ago
Read 2 more answers
Write a Java program that prints out a 4x4 square (like the one below)
Sindrei [870]

public class 4by4Square

{

    public static void main(){

       System.out.println("xxxx \nx  x\nx  x\nxxxx");

    }

}

<h2><u>~CaptnCoderYankee</u></h2>
5 0
3 years ago
What is the missing term in the code that handles that error??
kykrilka [37]

Answer:

try typing that into gooy gle im sorry if i didnt help

if tickets >400 What is the missing term in the code that handles that error??wat over400error

Explanation:

3 0
3 years ago
What type of collection is created with each assignment statement?
lilavasa [31]

Answer:

tuple

Explanation:

at first its a dictionary but then it is reassigned to a tuple

don't forget tuples are immutable

7 0
2 years ago
Other questions:
  • Number Analysis Program: Write a program that reads data from the text file numbers.txt. Assume the file contains a series of nu
    14·1 answer
  • Using the expected format, of putting key information where the reader can’t find it, is an example of?
    8·2 answers
  • The button for adding a picture to a spreadsheet is found in the
    15·1 answer
  • 3 Points
    9·1 answer
  • By Carl Sandburg
    6·1 answer
  • The staff of the ___________________ will need to enter, maintain, and retrieve data from electronic health records within a hos
    9·1 answer
  • What happens when you call someone whose phone is off?
    6·2 answers
  • Donna often travels around the world. When she travels, she needs to access her emails from different locations. However, to kee
    6·2 answers
  • Write a Java program to encrypt and decrypt a phrase using two similar approaches, each insecure by modern standards. The first
    15·1 answer
  • With SQL, how do you select all the columns from a table named "Persons"?
    8·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!