Friday, March 11, 2011

Wi-Fi

WIFI
WIRELESS FIDELITY
INTRODUCTION:
Wi: Wirless Fi: Fidelity.

The name itself indicates that wireless data carrying capacity so it is called wireless Fidelity. WiFi is the way to connect devices together without wires.
HOW DOES IT WORK:
Wireless Internet Access has four components that form its structure. The four components are,
1)High-speed access which is also known as broadband is an internet connection which is generally faster than dial up service. Example: satellite service.
2) Network Gateway is between your high-speed access connection and the wireless network, it acts like a gate. This gate will prevent people from accessing your wireless network unless you know about it, the gateway also allows managing tools as well.
3) Wireless network is a system of connecting PC's and otherdevices within the same physical proximity using high frequency radiowaves instead of wires.
4) Wireless customers are people who have a PC and a wireless adapter . The wireless adapter can be built in or it can be an external device plugged into your computer.
The radio waves are transmitted from antennas and routers and are picked up by WiFi receivers s. When these devices receive a signal, the WiFi card then reads the signals and produces an internet connection.
HOT SPOTS:
Hot spots are connection points for WiFi networks; areas where wireless internet is available for those who have internet ready devices. Hot spots are becoming available everywhere, in airports, hotels, etc.
HOW SECURE IS WiFi:
wireless LANs are more vulnerable due to the fact that the data travels over radio waves which are much easier to intercept. In 2002 the wireless LANs security was upgraded when WiFi Protected Access (WPA) was introduced. WPA had several improvements like better encryption, and it also used the RADIUS-based 802.1X, which authorizes the user to gain access to the ISP provider.
In 2004 802.11i was completed and became the new and current standard for WiFi. 802.11i is also nown as WPA2. WPA2 upgraded its encryption of data with the Advanced Encryption Standard
Many corporations today use a Virtual Private Network (VPN) to send and receive important information by creating a tunnel connecting the two end users. VPN encrypts the data to keep any hackers from stealing the information while it is being sent
FUTURE WiFi ADVANCEMENTS:
BLUETOOTH:
It is a wireless technology that allows computers, phones and other devices to talk to each other over short distances. In non-discoverable mode of devices all your information and data are safe. However, in order to receive business contacts wirelessly you will need to place the phone in discoverable mode.
ULTRA WIDEBAND MODULATIONS(UWB): one of the most leading technologies is Ultra-wideband (UWB) modulations. UWB usually refers to a radio modulation technique based on transmitting very-short-duration pulses . UWB operates at such low power, it has very little interference impact on other systems.
RADIO FREQUENCY IDENTIFICATION TAG (RFID):
It is a small silicon microchip attached to an antenna that emits a unique serial number via radio over short distances. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the information. . RFID tags can also be placed in living organisms to help track or identify them within short distances. RFID tags can be read without your knowledge which enables others to view information about you.
ADVANTAGES:
 Reduces the costs of network deployment and expansion.
 The price of chipsets for Wi-Fi continues to drop.
 Unlike mobile telephones, any standard Wi-Fi device will work anywhere in the world.
 The current version WPA2 is not easily defeated, provided strong passwords are used.
LIMITATIONS:
 Wi-Fi signal actually occupies five channels in the 2.4 GHz band resulting in only three non-overlapped channels in the U.S.and three or four in Europe.
 Security problems.
WAYS TO PROTECT YOUR WIRELESS COMPUTER:
 You should have strong passwords on your wireless.
 Another way to protect yourself is to download firewalls onto your computer.
 Downloading anti-virus software onto your computer is another way to protect your computer. You should update your anti-virus software often .
 Also when you are not on your computer, you should turn it off.
CONCLUSION:
WIFI has a lot of advantages over its disadvantages, hence we must understand that we have to take the proper precautions to make the WIFI technology more secure .

No comments:

Post a Comment