Wireless Networking Overview

Whether you wish to make a telephone call from your mobile, get a message on your pager, or check your email from a PDA, we’ve encounter a wireless voice or data network. A wireless network system can prevent the downtime, which might be caused from the wired network. A wireless system also saves your time and efforts in installing the lot of wires.

Moreover, if you will need to relocate a client machine in your office, you just have to move the computer with wireless network card. Wireless networking is quite helpful in the public areas, libraries, hotels, schools, airports, railway stations where you might discover wireless access to the internet. A drawback in the wireless internet is that quality of service (QOS) isn’t guaranteed if there is any interference then the link may be dropped.

Wireless Network Types

Wireless Local Area Networks (WLANS)

WLANS make it possible for users in local area, like in a college or a library to form a community and gain wireless access to the internet. A temporary system can be formed by a few of users without the necessity of access point; provided they don’t have to access the tools.

Wireless Personal Area Networks (WPANS)

There are two current technologies for wireless private network Bluetooth and Infra Red. These technologies will enable the connectivity of private devices within a place of 30 feet. Infra Red requires a direct line and the range is significantly less as compared to Bluetooth technology.

Security in Wireless Networking

The following different kinds of security methods can be found in the wireless network.

Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy is meant to stop the interference of radio frequency that’s signaled by unauthorized users and this safety measure is the most acceptable for the tiny networks. There’s not key management protocol and every key is entered manually to the customers that is why this is very time consuming administrative task. The WEP security technique is based on the RC4 encryption algorithm. In the WEP all of the client computers and accessibility points are configured using the exact same encryption and decryption keys.

Service Set Identifier (SSID)

Service Set Identifier (SSID) functions an easy password by enabling WLAN system to be divided up into various networks and each having a special identifier. These identifiers are configured at the various access points. To access any networks, a computer is configured in such a manner that each is using a corresponding SSID identifier for this network. If the SSID match between the 2 computers or networks then access is given to one another.

Media Access Control filtering (MAC Access Control)

A list of the MAC addresses of the client computers can be inputted to an entry stage and only those computers are allowed to provide the access to the community. When a computer makes a request, its MAC address is compared to the list of the MAC addresses into the Access point and according to this access permission granted to deny.
This is a fantastic security system but it is largely involved in the tiny wireless networks because there’s more manual work is involved of entering the MAC address to the Access point.


Bluetooth is a simple sort of the wireless network that operates in the electronic devices, like phones phones, personal computers, PDA, Laptops, digital camera, MP3 players and other Bluetooth enabled devices to form a small network. From the Bluetooth technology eight devices can be attached to one another at precisely the exact same time. Bluetooth is also found from the cans, hands-free kits, wireless mouse and keyboards. Bluetooth technology has been invented by Ericsson in 1994 and after four years in 1998 several significant cell phone companies like Nokia, Ericsson, Intel and Toshiba formed a group to promote this technology.

Bluetooth technology falls in the category of personal area networking since it works in the range of 30 to 300 feet. Bluetooth uses the radio waves technology, which isn’t so expensive and has low power consumption. Many diverse businesses are meant to bring the Bluetooth chip in their electronic devices. Bluetooth technology has become very popularity due to its low price and portability.

The Future of Wireless Networking

WLANS wireless media type is highly common in home networking and more than 20 percent houses with broadband internet are using WLANS and this amount is increasing. In a general quote worldwide hotspots have now reached over 30,000 and will grow about 210,000 in the upcoming few years. Most large hotels already offer the business travelers are willing to pay wireless access. 802.11 is the upcoming Wi-Fi rate standard is set to provide bandwidth around 108Mbps and is still under development. With the rate of 70 Mbps and a range up to 30 miles, the 80216 standard, called WiMAX is guaranteed to get boost.

Some Tips & Tricks

When purchasing a wireless NIC card attempt to get one which is having outside antenna. When you’re outside and utilizing Wi-Fi enabled notebook, disable Microsoft sharing and file, which enables other computers in a network to access resources and data on your computer. This manner, your computer or laptop will be saved from hackers.

  • If you’re concerned about the interference in the other wireless access point place the AP and wireless computers to utilize a non-overlapping channel.
  • Change the configuration port password of the access point before you enable it.
  • Only purchase an access point which is having upgradeable capabilities. By this way you can take the benefit of security enhancements.
  • Keep the access point current.

About The Author

Related Posts

Leave a Reply