OVERVIEW OF WIRELESS NETWORKING

Here you can get information about wireless networks wifi, Introduction to general security in WLAN, WPAN, WMAN, WEP and overview of wireless access. To make a phone call from your cell phone received a message on your pager, checked your e-mail from a PDA, we have come through a wireless data network or voice.

If a user or a company wants to make a portable data is then wirelessly answer. A wireless system can prevent downtime that may occur in the wired network. A wireless network also saves time and effort in the installation of the large number of cables.

Also, if you need to move a client machine in your office, you simply move the computer with the wireless network adapter.

The wireless network is very useful in public places, libraries, hotels, schools, airports, train stations, where you can find wireless Internet access. A disadvantage in the LAN connection is that the quality of service (QoS) is guaranteed if there is interference, then the connection will be removed.

Types of wireless networks

Local area network (LAN)

WLANs allow users in the local area, as at a university or library to form a network and wireless internet. A temporary network can consist of a small number of users without the need for access point, since it does not need access to resources

Wireless Personal Area Networks (WPAN)

There are two existing technologies in wireless personal networks, Bluetooth and infrared. These technologies allow the connection of personal devices within an area of 30 feet. Infra-Red requires a direct line, and they are smaller compared with Bluetooth technology.

Wireless Metropolitan Area Network (WMAN)

WMAN connectivity allow multiple networks in a metropolitan area such as building a city. The network connection is the alternative to copper wires or fiber.

Wireless Wide Area Network (WWAN)

WWAN or wireless area network can be maintained over large areas, or in different towns or across countries, via multiple satellite systems or antenna sites. The types of system is called 2G systems.

The table below shows the many different types of wireless networks covering.

Meter grid

Personal Area Network 0-10

Local Area Network 0-100

Wide is the red 0-10000

Wireless Network Security

The following types of security methods available on the wireless network.

Wired Equivalent Privacy (WEP)

Wired Equivalent Privacy is intended to end interference by radio frequency indicated by unauthorized users, and this precaution is best suited for small networks. There is no key management protocol, and each key is manually entered on customers is the reason for this is a very slow administration. WEP security method is based on RC4 encryption algorithm. WEP In all client computers and access points are configured with the same encryption and decryption keys.

Service Set Identifier (SSID)

Service Set Identifier (SSID) acts a simple password, which allows a WLAN to be divided into different networks, and each has a unique identifier. These IDs are configured on multiple access points. To access any of the network that a computer is configured so that each has a corresponding SSID identifier for that network. If the match between the two teams SSID or network access is granted to the other.

Media Access Control MAC filtering (access control)

A list of MAC addresses to client computers can be placed in an access point and the team shall be awarded only to provide access to the network. When a team makes a request, its MAC address is compared with a list of MAC addresses to the access point and on the basis of this access is given to deny.

Manual labor is a method of security is good, but most often involved in small wireless networks because there is more involved to enter the MAC address of the access point.

Bluetooth

Bluetooth is a simple wireless network that operates in digital devices such as mobile phones, PCs, PDAs, laptops, digital cameras, MP3 players and other Bluetooth devices to form a small network. In eight Bluetooth devices can connect to each other at the same time. Bluetooth can also be found on headsets, handsfree, wireless keyboard and mouse. Bluetooth technology was invented by Ericsson in 1994, and after four years in 1998 some of the big mobile companies like Nokia, Ericsson, Intel and Toshiba have formed a group to promote this technology.

Bluetooth Technology falls under the category of personal area networks that operate over the range 30 to 300 meters. Bluetooth technology uses radio waves, which is not very expensive and has a low consumption of energy. Many different companies are adding to the Bluetooth chip in digital equipment. Bluetooth technology is more popular because of its low cost and portability.

The future of wireless networks:

WLAN type wireless network is very popular in home network and more than 20 percent of households with broadband Internet access via WLAN and the number is rising. In an overall estimate of access points in the world has reached over 30,000, and will grow by about 210,000 in the coming years. Most large hotels already offer Wi-Fi and business travelers are willing to pay for wireless access. 802.11 is the next Wi-Fi speed standard is set to offer around 108 Mbps bandwidth and is still under development. With the speed of 70 Mbps and a range of up to 30 miles, 80,216 standard known as WiMAX is sure to gain momentum.

Some tips and tricks:

• When you buy a wireless NIC to try to get one that has an external antenna. When you're out and using Wi-Fi laptop, disable Microsoft file sharing and allowing other computers on a network to access data and resources on your computer. Thus it or laptop be saved from hackers.

• If you are concerned about interference from the wireless access point, the second set of AP and the wireless computers to use one channel do not overlap.

• Change the password for the configuration interface of the access point before power.

• Buy only one entrance, you need to upgrade capacity. This way you can benefit from safety improvements.

• Keep access points to date.