Tuesday, December 24, 2019

Art Case Study - 1192 Words

Juan Luna Auto biography Birthname Juan Luna y Novicio Born October 23, 1857 (1857-10-23) Badoc, Ilocos Norte, Philippines Died December 7, 1899 (1899-12-08) (aged 42) Hong Kong Studied Academia de Dibujo Y Pintura, Ateneo de Manila Escuella de Bella Artes Mother Laureana Novicio y Ancheta Father Joaquà ­n Luna de San Pedro Field Painting, drawing, sculpting Movement Romanticism, Realism Works Style of painting Juan Lunas paintings are described as being vigorous, realistic and dramatic and with romantic elements. In a single brush stroke, he paints a fair of emotions that fills the beholder with drama and tragedy of his theme. His style shows the influence of Delacroix, Rembrandt, and Daumier. However, despite†¦show more content†¦I find it scary. Besides, the picture seems to be mocking you. -Another critic also said that although Leonardo worked on the Mona Lisa over a number of years in a number of different cities, none of his business or household records contain any mention of a model who might have sat for the portrait. In an article in the January issue of Arts and Antiques, Schwartz describes how her conclusions tie together a number of seemingly unrelated anomalies in the painting, its shadowy quality, the unusual dress, the lack of jewelry, the awkward pose and the split pair of unrelated landscapes on either side of the figure. She points out that Leonardo s delight in riddles caused him to plant clues in all his paintings and that the Mona Lisa was no exception. When these clues are taken together with da Vincis known homosexuality and life style, a picture emerges of the great painter creating a disguised self-portrait in womens clothes. As Schwartz puts it, That famous smile, so tantalizing for so many centuries is the mirrored smile of da Vinci himself. -Another says he haven’t seen the big deal of the painting. He quoted â€Å"It’s just a portrait of a not particularly interesting woman against a dark and mountainous backdrop. Undoubtedly highly proficient technically, it is, to my eye, an unemotional and unmoving piece of art.† Self Portrait (1515) -The identification of the drawing as a self-portrait was made in the 19th century, based on the similarityShow MoreRelatedStatus of Qualitative Research in Early Childhood Education and Development (Eced)1733 Words   |  7 Pages2005-2010. The first two journals are published by Rutledge and the last one is published by Springer. The starting point for the literature review was library data base of IED, which permitted access to full text articles. Large no of qualitative studies were found in each journal however, for the present review, only 25 of them were selected on the basis of different research traditions within qualitative paradigm. 15 of them are reviewed for the present task and bibliography of the remaining articlesRead MoreCase Study Art of Motivation5060 Words   |  21 PagesHUMAN RESOURCE MANAGEMENT THE ART OF MOTIVATION Human Resource Management MRB 2032 Case Analysis 3 THE ART OF MOTIVATION EXECUTIVE SUMMARY This article is about the art of motivation in Nucor, about strategy and action plan to motivate the people such as talking to them, listening to them, taking a risk on their ideas, and accepting the occasional failure. It s a culture built in Nucor with symbolic gestures with unblinking focus on the people on the front line of the business inRead MoreSystems Analysis : System Analysis1421 Words   |  6 Pageswhole, a lot of organizations cannot recognize looming threats nor understand the effects of these threats and are yet to come up with alternatives options for these threats. Case studies were performed on three organizations: Opportunity Consultants Inc (OCI), Baria Planning Solutions Inc (BPS) and Bayonne Packaging. The cases would show the root-cause issues at these organizations based on 5-Whys and basic system analysis. They will also show based off my explanation of systems analysis of howRead MoreCase Study Approach Is Often Associated With Descriptive And Explanato ry Research Essay1343 Words   |  6 PagesCase study approach is often associated with descriptive and explanatory research. The research problem is usually â€Å"how† and â€Å"why† problem, thus resulting in a descriptive or explanatory study (Cooper Schindler, 2011). How or why questions are being posed, when the focus is on a contemporary phenomenon within some real life context. Case studies usually provide qualitative rather than quantitative data for analysis and interpretation (Yin, 2003). Case study refers to qualitative, analysis of caseRead MoreInnate Ideas Essay1444 Words   |  6 Pagesproduce art, which is also open to based on a matter of opinion. Beauty is in the eye of the beholder; this is especially true for the world of art. For instance, look at the work of Jackson Pollock, his work consist of what seems to be just paint splatters but the chaotic design of these paint splatters possess the power to move the viewer. This is why anything can be considered art if it has some type of emotion associated with it. Which is why things like sports or dance can be considered art theyRead MoreCase Study Example Xyz Corp.1461 Words   |  6 PagesCase Study Sample DRAFT #1 Table of Contents Overview .........................................................................................................................1 Supplier ...........................................................................................................................2 About XYZ Corporation ...................................................................................................2 End User .........................................................Read MoreA New Kind of Structure. Research and Development, Pfizer1245 Words   |  5 Pagesï » ¿a new kind structure A Case Study Presented to the Faculty of the Department of Business and Management College of Management and Economics of the Visayas State University ______________________________________________________ In Partial Fulfillment of the Requirements in MGMT 101: Concepts and Dynamics of Management ______________________________________________________ Submitted by: GROUP I (Write your Group Number) (Names of MembersRead MoreCase Study Analysis - Public Relations Research1394 Words   |  6 PagesCOMM 4155 CASE STUDY ANALYSIS ASSIGNMENT NAME: Judy Kundert DATE: APRIL 25, 2011 CASE STUDY: COLORADO ALLIANCE FOR ENVIRONMENTAL EDUCATION STATEMENT OF THE PROBLEM: Colorado Alliance for Environmental Education is a 501(C) 3 nonprofit corporation that exists to serve the shared interests of public agencies, businesses, teachers, community organization, and individuals disturbing or using environmental education (EE) materials and programs. It is a neutral and objective source of informationRead MoreEssay on Aeronautical Decision Making1344 Words   |  6 Pagesby pilots to consistently determine the best course of action in response to a given set of circumstances. It is what a pilot intends to do based on the latest information he or she has† (FAA, 2012 p.1). ADM is necessary in all situations but this study will pertain to specifically ADM regarding VFR flight into IMC conditions. In the General Aviation Pilot’s Guide to Preflight Weather Planning, Weather Self-Briefings, and Weather Decision Making handbook (2009), the FAA uses the Perceive-Process-PerformRead MoreStatement of Purpose for a Career in Computational Finance1041 Words   |  4 PagesThe world of Finance is by no means a new concept for me. Watching â€Å"Mad money with Jim Cramer† videos on cnbc.com for his daily stock picks is a ritual. I would study the company’s business model, perform very rudimentary fundamental and qualitative analysis on these picks and if its intrinsic value matched the criteria set, I would add it to my portfolio on Investopedia.com. Apart from this, I also spent a considerable amount of time researching on various stock picking strategies to further strengthen

Monday, December 16, 2019

Relationships and Breakup Free Essays

* When two parties disclose personal information with each other the consensus is that the two persons will like each other more. (Rowland Miller, 2012) * Disclosure within a relationship is beneficial by raising intimacy, trust and closeness levels between two partners (Dindia Fitzpatrick, 1985: Duck, 1994a) * Strangers who open up to each admire each other more than couples who reveal less personal information to each other (Slatcher, 2010) * That being said, this shows that there is a very strong bond when disclosing personal information to each other and that it plays a large role when building a relationship. * Social penetration theory (Altman Taylor,1973) * New relationships have a large breadth of topics discussed, while the depth of the topics is very shallow. We will write a custom essay sample on Relationships and Breakup or any similar topic only for you Order Now Self-disclosure is rare to be found at this level of relationship. Break ups * If a person’s past relationship was broken off early within the relationship, that is the depth of the topics discussed was very shallow and little self-disclosure occurred, than it would be safe to say that within a new relationship they would seek that acceptance and self-disclosure earlier on. They never really got to disclose personal information with their ex, therefore they may pursue that self-disclosure more ambitiously within the new relationship. * If a person’s past relationship was broken off at a later stage where self-disclosure between two partners was a common occurrence the parties may misattribute the separation with rejected disclosed information. Within new relationships it may take longer for them to disclose information with their new partners. Revised Filter Theory New Relationships Hypotheses/Questions we want to ask: * Does the denial of disclosed information from previous relationships have an outcome on newly formed relationships? That is, is it harder to disclose information to new partners? Does it take longer? * If past the past relationships ended early on before self-disclosure could occur. Do people pursue self-disclosure earlier on in the newly formed relationship? How to cite Relationships and Breakup, Papers

Sunday, December 8, 2019

Through Practical Applications Of Wireless â€Myassignmenthelp.Com

Question: Discuss About The Through Practical Applications Of Wireless? Answer: Introducation As stated above, wireless LAN has become the most popular wireless technology in the world, this outcome has been facilitated by its conveniences and benefits which have enhanced all applications of networking/connectivity [1]. Furthermore, its associated protocol (IEEE 802.11) has enabled secure access to networking resources while boosting collaboration with other associated technologies. In fact, through wireless LAN different users having different devices as well as technologies can connect to the same networks. This outcome is very different as compared to past systems that used wired networks that required the users to connect to the same wiring system in order to access similar resources. As the technology grows, the users have also had to adapt to the associated problems more so, security where advanced security protocols have been developed to filter networks frames/data. These security protocols have also grown with the technology where a growth, from WEP, has led to the d evelopment of WPA and WPA2 [2]. Nevertheless, one of the most significant factor in the application of WLAN has been the internet, which through its services and resources has influenced end-users to seek effective means to access it. Therefore, wireless LAN can be thought of as a conventional technology, whose growth and applications has been influenced by the subsequent growth of the internet. Furthermore, the increased demand of wireless LAN has seen multiple technologies and protocols introduced in order to match the sharing functionalities of computer resources through wired networks [3]. The sharing of computer resources is further exemplified by the connection spectrum used which uses an orthogonal frequency division multiplexing technique to increase the overall network access. In the end, the user has enhanced flexibility and extended network coverage, important factors in the enhancement of communication outcomes. Literature Review WLANs IEEE 802.11 standard was created back in 1987 as a standardization of wireless communication where it was used as a low power communication protocol. In itself, the protocol did not require any form of licencing and could be used for various functionalities. However, at the initial stages, its application was derailed by the nature of the used as they required expensive and bulky equipment. This derailment would come to pass in the 1990s when the growth of the telecommunication industry saw the development of proprietary protocols and solutions that had different versions of the mother protocol (IEEE 802.11) [4]. Throughout the years two main WLAN standards have been developed; IEEE 802.11 and Hiper LAN. Now, the IEEE 802.11 is better of the two having mature functionalities as result of its extensive application throughout the industry. Furthermore, its applications, components and cards are produced by many manufacturers who hold different objectives while facilitating the enhancement of wireless networks. In terms of operation, it uses the 2.4 GHz range which provides an all-inclusive connectivity of mobile/portable stations across a given local area network [5]. This outcome has enhanced its application where its growth is clearly outlined by the evolution of the transfer rates, as exhibited in the diagram below. IEEE standard evolution Standard Frequency used Transfer rates Operation range Legacy 2.4 GHz 1 Mbps Unknown 802.11a 5 GHz 25 Mbps 30 m 802.11b 2.4 GHz 6.5 Mbps 30 m 802.11g 2.4 GHz 25 Mbps 30 m 802.11n 2.4 GHz 200 Mbps 50 m On the other hand, HIPERLAN (an acronym for High-performance radio local area network) represents a standard developed by the European institute of telecommunication (ETSI) in order to enhance the overall performance of wireless networks. The technology or standard is used with portable devices that require broadband connections such as UMTS (Universal Mobile Telecommunications System) and ATM (Asynchronous transfer mode). However, its application is still limited as it's still in the prototyping stages [6]. Components of WLAN Regardless of the protocol used, WLAN uses the same components that are similar to the traditional systems used to facilitate its operations. These components are access points, interface cards (adapters), repeaters and antennas. Now, these elements are used to collaborate the wireless infrastructure through their respective operations. Moreover, these components are supplemented by other functionalities particularly those of security that ensure the right people access the network resources. These additional functionalities are authentication, authorization and accounting [7]. In the modern structure, RADIUS servers (remote address dial-in user service) are used to perform these functionalities while being collaborated with network management servers (NMS). Furthermore, the respective devices/gadgets used to access the networks are made using intelligent technologies that help to protect the users. IEEE 802.11 main components Stations also referred to as base stations, these component houses the devices that support the networks functionalities through their computing capabilities. In all, the wireless networks are designed to transfer data packets from one station to another, a functionality that requires the base station. These stations are controlled by the access points and can either be a portable or a non-portable devices e.g. a laptop. Access points an important component that offers the bridging service to wireless networks, where communication frames are converted from wired systems to wireless connections. Therefore, access points enable WLAN to be connected to the rest of the world more so, to other wired connections [8]. Medium (wireless) the radio spectrum is used as the medium, where electromagnetic waves are used to connect the various service stations. However, this medium is supported by several physical layers. At the start, two physical layers were used; infrared and radio frequency but, RF has grown to become the most popular option. Distributed systems having established the access points, their communication over a large area requires a tracking facility to highlight the movement of portable stations. Now, the logical element used to meet this functionality is the distributed system which is used to forward network frames to their respective destinations. Because of their functionalities, distributed systems are known as backbone networks e.g. Ethernet [4]. WLAN Architecture The IEEE 802.11 standards allow wireless networks to be configured using two main methods: The infrastructure method/mode. The Adhoc mode. In the first mode (infrastructure), a common central access point is used to coordinate operations where different service stations are served in a distributed way. In comparison to this structure, the Adhoc mode does not have a central access point and therefore will not have a common network coordinator [9]. This outcome decreases accountability which facilitates network intrusions among many other inconveniences. Nevertheless, both models use similar access method i.e. the distributed coordination function (DCF). However, the infrastructure mode does also facilitate its operations using another additional access method, the point coordination function (PCF). DCF (common method): an access method that uses carrier sensing to coordinate the transfer of data packets. In most wireless networks, the CSMA/CA (Carrier sense multiple access/ collision avoidance) technique is used to coordinate communication where packet collisions are avoided in the telecommunication channels. This outcome is accomplished using an intelligent functionality that analyses the content of service stations and channels before communication is conducted [10]. PCF: on the other hand, PCF, unlike DCF, will use time division technique (TDM) to coordinate operations across network stations. Now, PCF will use a point coordinator who will act as a master to the stations (slaves). Through this structure, the transmission period is divided into different sections with each station being allocated a time frame. The station on its behalf will then transmit information when given a go ahead by the point coordinator through a polling frame element. Therefore, the coordinator will decide the stations that are allowed to transmit thus eliminating delays due to collisions [4]. Protocol architecture From the diagram above its easy to identify the similarity between the IEEE model with the OSI model where the physical layer (lowest layer) directly corresponds with that of the OSI model. Now, the physical layer, in this case, is used to perform several functionalities including the encoding and decoding of communication signals. Moreover, the layer will facilitate the removal and generation of the preamble in readiness for network synchronization. Furthermore, the same layer will enable the communicating devices to transmit and receive data bits based on an electrical medium. Above the physical layer is the data link layer which encapsulates the logical link layer (LLC) and the medium access control layer (MAC). This layer through its subsidiary layers provides several functionalities including the assembling and error detection of data frames. The same layer will monitor network access through the communication mediums in order to avoid unauthorised access. Moreover, the data link layer will provide an elaborate interface with the other layers in order to conduct error and flow control functionalities [11]. WLAN categories Four main categories are used in this scenario; infrared LAN (IR), direct sequence spread spectrum (DSSS), frequency hopping spread spectrum (FHSS) and narrow band microwave LAN (NBML). IR operating within the 1 and 2 Mbps range, IR LANs are associated with inexpensive structures that operate within the same frequency range as those of fibre optic links. IR also only detects the amplitude of signals which minimises interferences across communication channels. Moreover, the same networks are not limited in terms of bandwidth which facilitates higher transmission speeds as compared to other LAN systems. In all, IR will operate using the light spectrum which is attributed to better transmission rates while having minimal resource requirements. In addition to this, IR LANs can operate using two transmission methods; an aimed mode which has the best transmission rates based on its bandwidth and throughput requirement and, two the omnidirectional mode, where signals are bounced off objects [12]. DSSS operating within the 2.4 GHz range, DSSS offers sevens communication channels that are characterised with optimal data rates of up to 2 Mbps. This category of LAN is used in the ISM field (industrial, scientific and medical) which in itself does not require any form of licencing. Nevertheless, DSSS will use multiple transmission bits to represent the original signal. These multiple bits are known as chipping codes and are used to spread the communication signal across a wider area using frequency bands that match the bits used. Therefore, while using DSSS, a chipping code having a 10 bits structure will spread the overall signal across a band that is 10 times bigger than the 1-bit signal originally used. FHSS another LAN category that uses the 2.4GHz range with a 2 Mbps data rate. The FHSS is also used within the ISM band and will also not require any form of licencing. However, unlike the DSSS, FHSS will broadcast signals over a series of radio frequencies which will enable the signals to hop from one frequency range to another using known intervals. Therefore, communicating devices (transmitter and receiver) will have to synchronise their hops in order to match their frequency ranges [13]. NBML operating at high frequencies, narrow band LANs will use microwave frequencies to transmit signals. In terms of application, they are the least used category and unlike the rest will not use spread spectrums. Their operations are conducted using single frequency modulation where a 5.8 GHz band is used. Now, the benefit of NBML is the high throughput that is achieved due to the absence of the spread spectrum overhead [5]. WLAN Applications WLAN application traverses all the fields and industries of business, including personal communication where increased demand for internet connectivity has led to the growth of the IEEE 802.11 standard. In all, four applications are exhibited by WLAN: Network extension Cross-building interconnection Nomadic access Ad hoc connectivity Network extension: local area networks in the past were associated with cabled infrastructure that used Ethernet connections to serve end users. These wired networks were expensive to set up and maintain, however, with WLAN, an effective and beneficial alternative is provided based on the existing wired infrastructure. Essentially, WLAN will be used to extend the reach of wired LAN thus facilitate a wider coverage, an outcome that will also increase the number of people being served. Therefore, as stated in the previous section, the Ethernet connection (distributed system) will form the backbone structure while the WLAN will extend the services [14]. Cross-building connection: while LAN may operate within closed quotas, some organizations will have multiple buildings each having their own respective LANs. Now, using wired connections, the building can be connected to form an extensive LAN connection. However, this method is expensive and will require many resources more so the cabling. WLAN more so, point to point connections (link) will facilitate the exchange of information across the different LANs. In this case, the WLAN will link network devices such as routers and bridges. Nomadic access: this application is a direct response to the desire of mobility and flexibility where LAN hubs are accessed by portable devices equipped with the necessary access infrastructure such as antennas. An example of this application is a student accessing an assignment stored in a campus server while using the Wi-Fi connection. As an application, nomadic access extends the network environment by allowing multiple users to operate within a wide area. Ad hoc: the final application of WLAN corresponds to one of the access mode discussed before, where operations are not governed by a central coordinator. In essence, ad hoc connections are peer to peer networks that are set up by users for specific and immediate needs. Therefore, ad hoc connections are usually temporary in nature having minimal control feature but with the capabilities of wireless connections. Through this applications, the participants act as both the servers and clients accessing the information they require [15]. New Findings (Recent Advances) Due to the rapid growth of the WLANs, wireless network professionals are under constant pressure to develop new technologies that meet the demands of the consumers particularly in the enterprise environment. Now, this section highlights some of the new findings discovered in the field of WLAN, more so, the advances in the IEEE 802.11 standard. Advances in IEEE 802.11 standard 802.11ac: a recent advancement in the IEEE standard that was released in 2015 having extended capabilities as compared to its predecessor, the IEEE 802.11n standard. The 802.11ac standard combines the benefits of mobile connectivity with those of Gigabit Ethernet technology. This outcome is achieved using its three dimensions of operations that are; one, extra channels bonding where a 160 MHz band is used (300 percent increase from the previous range). Two, better modulation as supported by quadrature amplitude modulation and finally, more inputs and outputs (MIMO). 802.11ad (WiGig): a short range WLAN that is designed using a high-frequency model that is able to carry more information while having a better throughput. Now, this standard will use a 60 GHz RF spectrum, unlike the commonly used 2.4 GHz range. Therefore, in close quotas, the standard will facilitate higher transmission speeds of about 7Gbps [16]. 802.11ah (Wi-Fi HaLow): a WLAN standard that answers the question of having a Bluetooth equivalent of wireless networks. In essence, 802.11ah will offer the same functionalities as Bluetooth connections but with the extended features of WLAN. Furthermore, it will operate at low frequencies (below GHz) thus will serve longer distances at lower costs. Moreover, the same standard will require low power to operate which will facilitate its application in smart systems such as those of IoT (internet of things). 802.11ax: outlined as the next big thing, the 802.11ax standard promises to have better functionalities and feature as compared to the existing WLAN technologies. For one, the standard will have faster speeds (between 4 to 10 times faster) as compared to the existing standards. Moreover, it will extend the coverage distance an outcome that will be coupled with multiple communication channels increasing the overall network throughput [17]. Therefore, for a single channel, the speeds may get up to 4 Gbps a result that will see the entire standard have speeds of over 14 Gbps. Furthermore, the standard will have minimal congestions owing to the orthogonal multiplexing techniques that will be used. In addition to this, it will have a better battery life because it will operate within convenient frequencies based on the users requirements. Conclusion Wireless LAN form a critical component of wireless networking where local connections are supported using wireless infrastructure. Now, based on the analysis done by this report, their application extend in all the fields of life which signify their importance in information technology. Moreover, their extensive application makes them the most notable and used technology in the world as many users will use them to access resources through different devices. Furthermore, their functionalities form the basis of worldwide networks more so the internet which integrates many resources through a common network. WLAN is also exhibited as an efficient technology that throughout the years has evolved to fit the needs of the users. This evolution is even seen today where new advances as outlined in the previous section have been developed. WLAN can, therefore, be outlined as a true reflection of technology because its attributed as a factor of time where it changes continuously based on the needs of the users. Therefore, in the future, WLAN will continue to boost its operations based on its defining factors and components which again are encapsulated within its transmission medium of the radio frequency spectrum. References R. Budhrani and R. Sridaran, "Wireless Local Area Networks: Threats and Their Discovery Using WLANs Scanning Tools," International Journal of Advanced Networking Applications (IJANA) , p. Available: https://www.ijana.in/Special%20Issue/26.pdf, 2016. R. Bhatnagar and V. Birla, "WI-FI SECURITY: A LITERATURE REVIEW OF SECURITY IN WIRELESS NETWORK," IMPACT: International Journal of Research in IMPACT: International Journal of Research in, pp. Available: https://www.impactjournals.us/download.php?fname=2-77-1431690921-4.%20Eng-%20Wi-Fi%20Security%20A%20Literature%20Review%20of%20Security%20in%20Wireless%20Network-Ruchir%20Bhatnagar.pdf., 2015. A. Zamani and J. Ahmed, "Wireless LAN security: IEEE 802.11g VPN," International Journal of Advanced Research in Computer Science and Software Engineering, pp. Available: https://www.ijarcsse.com/docs/papers/Volume_4/2_February2014/V4I2-0172.pdf, 2014. S. Ali and S. Mohan, "A Survey on IEEE 802.11 Wireless LAN Technologies," International journal of innovative research in computer and communication engineering, p. Available: https://www.ijircce.com/upload/2015/october/130_A_Survey.pdf, 2015. V. Wekhande, "WIFI Technology: security issues," River academic journal, pp. Available: https://www.rivier.edu/journal/RCOAJ-Fall-2006/J62-Wekhande.pdf, 2016. Rabbit, "An Introduction to Wi-Fi," Product manual, p. Available: https://ftp1.digi.com/support/documentation/0190170_b.pdf, 2010. G. Singh and Parminderpal, "Wireless Network Components Security Protocol," International Journal of Advanced Research in Computer Science, p. Available: www.ijarcs.info/index.php/Ijarcs/article/download/3734/3255, 2017. V. Vyas and N. Bhil, "Mobile Ad-Hoc Network (MANET) and its Security Aspects," IJARCSMS, pp. Available: https://www.ijarcsms.com/docs/paper/volume3/issue8/V3I8-0040.pdf, 2015. T. Kurzawa, "Wireless LAN 802.11," p. Available: https://cse.yeditepe.edu.tr/~sbaydere/courses_new/cse402/files/IEEE_802_11.pdf. S. Acker, "Enterprise WLAN architecture," Wireless Network Consulting Engineer, pp. Available: https://www.cs.uml.edu/~glchen/cs414-564/handouts/C05-WLAN_Arch.pdf, 2014. CSE, "IEEE 802.11 Wireless LAN standard," Chapter 14, p. Available: https://www.cse.unt.edu/~rakl/class3510/CHAP14.pdf, 2014. . Schwartz, "Frequency Hopping Spread Spectrum (FHSS) vs. DSSS vs. BWA and WLAN," White paper, pp. Available: https://sorin-schwartz.com/white_papers/fhvsds.pdf, 2015. SCI, "Wireless LANs," p. Available: https://www.sci.brooklyn.cuny.edu/~ziegler/CIS49.2/Notes_pdf/12_Wireless.pdf, 2012. V. Chandramouli, "A Detailed Study on Wireless LAN Technologies," The University of Texas at Arlington, pp. Available: https://www.uta.edu/oit/policy/ns/docsA. Ekbal, "Five trends shaping 802.11 WLANs," Wireless, pp. Available: https://files.iccmedia.com/magazines/basnov14/basnov14-p38.pdf, 2014. M. Savage, "3 Emerging WLAN Trends For 2017," Network computing, pp. Available: https://www.networkcomputing.com/wireless-infrastructure/3-emerging-wlan-trends-2017/2057356947, 2017.