You are on page 1of 14

WIRELESS

NETWORKING
AN OVERVIEW OF THE WIRELESS
NETWORKING

Here you will find wireless networking tutorials, what is wifi, general security
overview, wlans, wpans, wmans, wep and wireless access control overview.
Whether you want to make a phone call from your mobile, received a message
on your pager, checked your email from a PDA we have come across a wireless
data or voice network.

WIRELESS NETWORK TYPES

Wireless Local Area Networks (WLANS)
Wireless Personal Area Networks (WPANS)
Wireless Metropolitan Area Networks (WMANS)
Wireless Wide Area Networks (WWANS)

WIRELESS LOCAL AREA NETWORKS (WLANS)

WLANS allow users in local area, such as in a university or a library to form a
network and gain wireless access to the internet. A temporary network can be
formed by a small number of users without the need of access point; given that
they do not need to access the resources.

WIRELESS PERSONAL AREA NETWORKS
(WPANS)

There are two current technologies for wireless personal network Bluetooth
and Infra Red. These technologies will allow the connectivity of personal
devices within an area of 30 feet. Infra Red requires a direct line and the range
is less as compared to Bluetooth technology.

WIRELESS METROPOLITAN AREA NETWORKS
(WMANS)

WMANS allow the connectivity of multiple networks in a metropolitan area
such as building in a city. The network connectivity is the alternative of copper
or fiber cabling.

WIRELESS WIDE AREA NETWORKS (WWANS)

WWANS or Wireless Area Networks can be maintained over large areas such as in
different cities or between different countries, via multiple satellite systems or antenna
sites. The types of system are called 2G systems.
The following table shows the range those different types of wireless network covers.
Network Meter
Personal Area Network 0-10
Local Area Network 0-100
Wide Are Network 0-10000
Security in Wireless Networking
The following different types of security methods are available in the wireless
networking.

WIRED EQUIVALENT PRIVACY (WEP)

Wired Equivalent Privacy is intended to stop the interference of radio
frequency that is signaled by unauthorized users and this security measure is
most suitable for the small networks. There is not key management protocol
and each key is entered manually into the clients thats why this is very time
consuming administrative task. The WEP security method is based on the RC4
encryption algorithm. In the WEP all the client computers and Access points
are configured with the same encryption and decryption keys.

SERVICE SET IDENTIFIER (SSID)
Service Set Identifier (SSID) acts a simple password by allowing WLAN
network to be split up into different networks and each having a unique
identifier. These identifiers are configured in the multiple access points. To
access any of any networks, a computer is configured in such a way that each is
having a corresponding SSID identifier for that network. If the SSID match
between the two computers or networks then access is granted to each other.

MEDIA ACCESS CONTROL FILTERING
(MAC ACCESS CONTROL)
A list of the MAC addresses of the client computers can be inputted into an
Access point and only those computers are granted to give the access to the
network. When a computer makes a request, its MAC address is compared to
the list of the MAC addresses to the Access point and based on this access
permission granted to deny.
This is a good security method but it is mainly involved in the small wireless
networks because there is more manual work is involved of entering the MAC
address into the Access point.
BLUETOOTH

Bluetooth is a simple type of the wireless networking that operates in the digital
devices, like mobiles phones, personal computers, PDA, Laptops, digital camera, MP3
players and other Bluetooth enabled devices to form a small network. In the Bluetooth
technology eight devices can be connected to each other at the same time. Bluetooth
can also be found in the headsets, hands-free kits, wireless keyboards and mouse.
Bluetooth technology was invented by Ericsson in 1994 and after four years in 1998
some major mobile phone companies such as Nokia, Ericsson, Intel and Toshiba
formed a group to promote this technology.

BLUETOOTH CONT.
Bluetooth technology falls in the category of personal area networking because
it operates in the range of 30 to 300 feet. Bluetooth uses the radio waves
technology, which is not very expensive and has low power consumption.
Many different companies are intended to add the Bluetooth chip in their
digital devices. Bluetooth technology is getting very popularity because of its
low cost and portability.
THE FUTURE OF WIRELESS NETWORKING

WLANS wireless networking type is very popular in home networking and more than
20 percent homes with broadband internet are using WLANS and this number is
increasing. In a general estimate worldwide hotspots have now reached more than
30,000 and will grow about 210,000 in the next few years. Most large hotels already
offer Wi-Fi and the business travelers are willing to pay wireless access. 802.11 is the
next Wi-Fi speed standard is set to offer bandwidth around 108Mbps and is still under
development. With the speed of 70 Mbps and a range up to 30 miles, the 80216
standard, known as WiMAX is sure to get boost.
SOME TIPS & TRICKS

When purchasing a wireless NIC card try to get one that is having external antenna.
When you are out and using Wi-Fi enabled laptop, disable Microsoft file and sharing,
which enables other computers in a network to access data and resources on your
computer. In this way, your computer or laptop will be saved from hackers.
If you are concerned about the interference from the other wireless access point set
the AP and wireless computers to use a non-overlapping channel.
Change the configuration interface password of the access point before you enable it.
Only buy an access point that is having upgradeable capabilities. By this way you
can take the advantage of security enhancements.
Keep the access point up to date.

You might also like