The wireless network has changed the complete communication scenario of the modern world. It has made the world a smaller place, where people can reach out to their counterparts living miles away from them within a blink of an eye.
What is wireless networking?
Wireless networking is an interconnected network of various nodes using wireless data links. It is a technique to avoid the costly process of employing cables into an edifice. It is generally employed and managed using radio communication. The execution of wireless network takes place at the somatic layer of the OSI model network assembly.
The most common examples of wireless network are Wireless local networks, cell phone networks, satellite communication networks, wireless sensor networks, and terrestrial microwave networks.
Different Wireless links
Wireless links provide the connection of computers with the network. Different wireless links are listed below:
Terrestrial microwave – They use Earth-based receivers and transmitters like satellite dishes. They are usually in the low gigahertz range, limiting communications to only the line-of-sight.
Communications satellites – the mode of communication is carried out via microwave radio waves, which are not ricocheted by the Earth’s atmosphere. They can receive and relay data, voice and TV signals.
Cellular and PCS systems – The multiple geographic areas have a low-power transmitter to transmit calls from one zone to the other zone.
Radio and spread spectrum technologies – They use a high-frequency radio technology and spread spectrum technology to permit communiqué between various devices in a restricted area.
Free-space optical communication – It uses invisible or visible light for communications.
Types of wireless networking
WPANs connect devices within a comparatively small area, usually within an individual’s reach. Bluetooth is a very common example of WPAN.
Wireless LANs connect local resources to the Internet. It connects two or more devices over a small distance using a wireless distribution method.
Wireless mesh network:
This network is made of radio nodes systematized in a mesh topology. Every nodule forwards communications on behalf of the other nodules.
Wireless metropolitan area networks connect several wireless LANs.
Wireless wide area networks cover large areas. They are usually used to connect various subdivisions of enterprises. A typical system consists of access points, base station gateways and wireless bridging relays.
Global area network:
A GAN provides communication among a capricious number of satellite coverage areas, wireless LANs etc.
They allow communication between the spacecraft, generally in the purlieu of the Earth. NASA’s Space Network is a perfect example of space network.
Uses of wireless networking
Wireless networking has become an inevitable part of our day to day life. Most notable everyday use of wireless networks is the cellular phone which has enabled billions of people to stay connected with friends, family and the entire world. Other useful features of wireless networking include Intercontinental network systems, emergency services , for sending and sharing data rapidly among the various subdivisions of an enterprise, etc.
Wireless Network Security keys
The security of a wireless network is very important as the personal information and files on the wireless network can be easily accessed by people connected to the same wireless network. It can result in identity theft and many other malicious acts.
A network security key protects the wireless network from such unauthorized access. We can easily enable or change our security key through the Network and sharing center.
There are two wireless security methods:
Wi-Fi Protected Access (WPA and WPA2)
WPA and WPA2 entail users to provide a security key. After the key is authenticated, the data sent between the access point and device are encoded.
There are two types of WPA authentication:
WPA2 (WPA2 is the most secure).
Wired Equivalent Privacy (WEP)
WEP is an age old network security technique. It is still offered to upkeep the older devices, though it’s no longer suggested.
There are two kinds of WEP:
Open system authentication
Shared key authentication.