Wirless V's Wired

Posted on 2011-10-13
Last Modified: 2012-05-12
My organisation have purchased a building in the US and will be setting up another site, this building was an old warehouse and has very little data points.  My question is what are the main pros and cons of wired V's wireless. They would like to just implement wireless throughout the building instead of spending the money on wired data points. I know from our own wireless network here that there are speed issues, signal issues, another element to troubleshooting issues, security etc.  I would like to know if anyone else has implmented or researched implementing  wirless as your primary network for PC's, printers etc..and what your thoughts were on this.

Question by:collie3
    LVL 21

    Expert Comment

    Wireless is generally going to be slower than a wired network but depending on how many users you have planned it may be OK.
    LVL 8

    Accepted Solution

    If the warehouse is active then you will probably have interference. I ran a network with half the users in a warehouse building and the machinery created a lot of interference meaning that wireless wasn't practical for the users as we had problems with drop outs and speed issues. Although that was a few years ago.
    If they are refitting the new building I think it would be more worthwhile just investing in having the network wired, plus you have the added factor of troubleshooting and fixing machines every time they cant connect to the wireless or the signal drops when they are doing something.  We trialled it and found that the wired connections were more reliable and we spent less time configuring users computers. For a business network I would take a wired connection over wireless any time.
    LVL 14

    Expert Comment

    Definitely wired. Faster and much more reliable signal. My company tried wireless for a system we installed out West, and the heat and dust in the building caused EVERY single router/switch to malfunction. Had to rip them all out and go wired.

    Featured Post

    Threat Intelligence Starter Resources

    Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

    Join & Write a Comment

    This subject  of securing wireless devices conjures up visions of your PC or mobile phone connecting to the Internet through some hotspot at Starbucks. But it is so much more than that. Let’s look at the facts: devices#sthash.eoFY7dic.
    JSON is being used more and more, besides XML, and you surely wanted to parse the data out into SQL instead of doing it in some Javascript. The below function in SQL Server can do the job for you, returning a quick table with the parsed data.
    Via a live example, show how to backup a database, simulate a failure backup the tail of the database transaction log and perform the restore.
    This Micro Tutorial will show you how to maximize your wireless card to its maximum capability. This will be demonstrated using Intel(R) Centrino(R) Wireless-N 2230 wireless card on Windows 8 operating system.

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    17 Experts available now in Live!

    Get 1:1 Help Now