Thursday, January 17, 2013

Wifi Technology


        WiFi, “wireless fidelity” is the way to connect devices together without wires.  It can be done in homes, businesses, between businesses etc.  WiFi offers a lot of advantages over LANS, but it does include disadvantages.


     Wireless Internet Access has four components that form its structure: high-speed access, a networking gateway, a wireless network and a wireless customer.  The customer connects wirelessly through the wireless network to the gateway, it then launches their internet browser, authenticates through the gateway by entering a coupon code or purchasing time and the user has high-speed internet.

The four components are:

  1. High-speed access which is also known as broadband is an internet connection which is generally faster than dial up service.  Examples of high-speed internet access are ISDN, cable modem, DSL, and also  satellite services.
  2. Network Gateway is between your high-speed access connection and the wireless network, it acts like a gate.  This gate will prevent people from accessing your wireless network unless you know about it, the gateway also allows managing tools as well.  These can include authentication, network monitoring, and other services such as printing and voice over IP. 
  3. Wireless local area network is a system of connecting PC's and other devices within the same physical proximity using high-frequency radio waves instead of wires.  Wireless networks work as long as your wireless ready device is within range.
  4. Wireless customers are people who have a PC and a wireless adapter which means they can access the internet wirelessly.  The wireless adapter can be built in or it can be an external device plugged into your computer. 



WiFi, allows a universal internet connection to be broadcasted through radio waves.

Radio waves are what make WiFi exist and run.  They allow WiFi networking to occur between numerous people.  The radio waves are transmitted from antennas and routers and are picked up by WiFi receivers such as computers and cell phones equipped with WiFi cards.  When these devices receive a signal within the range of a WiFi network, the WiFi card then reads the signals and produces an internet connection without a cord.   Once a connection is established between user and the network , the user will be prompted with a login screen and password if it is fee based.
WiFi networking around the world is creating not spots in the cities where anyone with a laptop can wirelessly plug into the internet.  Hot spots are connection points for WiFi networks; areas where wireless internet is available for those who have internet ready devices.  Hot spots are becoming available everywhere, in restaurants, hotels, airports, schools, etc.
The main source is the antenna; the antenna sends radio signals to the people who want to access the internet.  The people wanting access must have a Wife card; the Wife cards receives the radio signals through its' Wife receivers and creates a wireless connection.
  • Freedom of Movement
  • Many compatible devices
  • Continuous connection to a network from a variety of sites.
  • No wires = lower installation costs

            WiFi has had, and continues to have several security issues.  In September of 1999 WEP (Wired Equivalent Privacy) was the standard for wireless PC’s.  WEP is used in the physical and data link layers, and was designed to give wireless LANs the same security that wired LANs had.  WEP provided security by encrypting the data while it traveled from one end point to the other.  Unlike wired LANs who’s networks are usually inside of a building where it’s protected wireless LANs are more vulnerable due to the fact that the data travels over radio waves which are much easier to intercept.  
            In 2002 the wireless LANs security was upgraded when WiFi Protected Access (WPA) was introduced.  WPA had several improvements like better encryption, and it also used the RADIUS-based 802.1X, which authorizes the user to gain access to the ISP provider.   Also the setup for WPA was much simpler than the setup for WEP. WPA came in two types, Enterprise which was used for corporations, and also Personal which was used for home users.  
            In June of 2004 802.11i  was completed and became the new and current standard for WiFi.  802.11i is also known as WiFi Protected Access 2(WPA2).  WPA and WPA2 have several of the same qualities, but WPA2 upgraded its encryption of data with the Advanced Encryption Standard (AES).  There is a problem with AES however, and the problem is that this could require hardware upgrades for many wireless LANs.
       Virtual Private Networks use the internet to send and receive information by creating a tunnel connecting the two end users.  VPN encrypts the data to keep any hackers from stealing the information while it is being sent.  To use a VPN the two end users must be using the same authentic protocol or it will not work.  The authentic protocol gives only certain users access to certain information. 

Change the wireless network’s default name

A Service Set Identifier (SSID) is a unique ID used for naming wireless networks, and ensures the network name is different to other nearby networks. You should change the network name from the router’s default. This will make it harder for anyone to identify your browser and guess its default settings.

Use encryption

Encryption scrambles messages sent over wireless networks so that they cannot be read easily. If your network is not encrypted, enable encryption on your settings page. There are different forms of encryption, but we suggest that you use the Wi-Fi Protected Access (WPA/WPA2) version because it is stronger than other versions such as Wired Equivalent Privacy (WEP).

Choose a strong password

Change your password from a default supplied with the router. Make sure you use a password which is easy for you to remember but would be difficult for a stranger to guess, and preferably something with a combination of letters and numbers. Avoid using something obvious such as the name of your street.

Hide your network ID

A router broadcasts its SSID to anyone within range. You can alter the router settings to not broadcast the SSID and therefore avoid alerting hackers to the network’s existence.

Check that your device does not auto-connect to Wi-Fi signals

If your device is set to automatically connect to available Wi-Fi networks, then you run the risk of automatically connecting to unknown and potentially dangerous networks. You should switch off auto-connect on your device settings page – refer to the manufacturer’s instructions for more details.

            


     Bluetooth technology is built into electronic gadgets and allows them to connect directly with each other wirelessly.
Bluetooth technology and Wi-Fi share some pieces of technology, but are used for very different things.
Wi-Fi is often referred to as "wireless internet", because that's what it is most often used for, accessing the internet. When you see people surfing the web in a cafe, they're probably using Wi-Fi.
Bluetooth technology is in lots of the devices that you already have and can be used for all sorts of things. It works for both voice–like talking hands-free on a headset or speakerphone–and data like pictures, music and documents.
How can you use Bluetooth technology?
    Setting up Bluetooth products is easy. Bluetooth devices do most of the work for you–they can find and identify one another and all you need to do is push a button to give them permission to communicate. Also, because the devices work directly with each other, you can use Bluetooth technology almost anywhere.
Music - with Bluetooth wireless technology you can listen to music from your music player, mobile phone or computer using speakers, headphones, home stereos and many other devices.
Printing - with Bluetooth wireless technology you can also print your favorite pictures wirelessly directly from your Bluetooth enabled phone or PC.
Input - Bluetooth technology allows you to control your PC, laptop and more without the hassle of cords.
Transfer - Easily transfer photos, music and other information between your mobile phone and your PC or laptop using Bluetooth wireless technology.
Wi-Fi is great for the internet
You can use Wi-Fi to connect to the internet through a stationary access point. An "access point" is an extra piece of equipment that Wi-Fi generally requires to allow devices to connect and work together. While possible, it's hard to make Wi-Fi products, like a laptop, PC and a printer, connect and work together directly. This also means Wi-Fi works primarily in fixed locations, sometimes known as "hot spots."
Bluetooth technology goes with you
When you're in the car, you can use Bluetooth technology to talk hands-free on your phone or computer using a headset, speakerphone or car kit.
When you're away from home and want to use your laptop, but can't find a hot spot, no problem. You can use Bluetooth enabled 3G and 4G cell phones to tether your laptop and use the 3G and 4G speeds as an internet connection.
Speed
The speed of your Wi-Fi connection depends on how many other people are connected to the same "access point." If the coffee shop or airport terminal is crowded, your Wi-Fi internet connection may slow down a bit.
Because Bluetooth products talk directly with each other, it's very rare that having many products connected at one time will slow down the speed of your connection.
 A Radio Frequency Identification (RFID) tag is a small silicon microchip attached to an antenna that emits a unique serial number via radio over short distances. The RFID device serves the same purpose as a bar code or a magnetic strip on the back of a credit card or ATM card; it provides a unique identifier for that object. And, just as a bar code or magnetic strip must be scanned to get the information, the RFID device must be scanned to retrieve the information.  In contrast, RFID devices will work within a few feet (up to 20 feet for high-frequency devices) of the scanner. For example, you could just put all of your groceries or purchases in a bag, and set the bag on the scanner. It would be able to query all of the RFID devices and total your purchase immediately.  RFID tags can also be placed in living organisms to help track or identify them within short distances.  This is not extremely dangerous but it will need to be encased in a special kind of casing that will not irritate or react with the living tissues that it is inserted into. 

Disadvantages
Some of the disadvantages of this technology are that they are relatively easy to jam using energy at the right frequency. RFID tags are also difficult for consumers to remove; some are very small and others may be hidden or embedded inside a product where consumers cannot see them or get to them. RFID tags can be read without your knowledge which enables others to view information about you.  These new WiFi advancements are destined to change the networking world all together.  But we must understand that we have to take the proper precautions to make these new technologies more secure for the customers.

Benefits of Wifi
The popularity of wireless LANs is a testament primarily to their convenience, cost efficiency, and ease of integration with other networks and network components. The majority of computers sold to consumers today come pre-equipped with all necessary wireless LAN technology.
§  Convenience – The wireless nature of such networks allows users to access network resources from nearly any convenient location within their primary networking environment (a home or office). With the increasing saturation of laptop-style computers, this is particularly relevant.
§  Mobility – With the emergence of public wireless networks, users can access the internet even outside their normal work environment. Most chain coffee shops, for example, offer their customers a wireless connection to the internet at little or no cost.
§  Productivity – Users connected to a wireless network can maintain a nearly constant affiliation with their desired network as they move from place to place. For a business, this implies that an employee can potentially be more productive as his or her work can be accomplished from any convenient location.
§  Deployment – Initial setup of an infrastructure-based wireless network requires little more than a single access point. Wired networks, on the other hand, have the additional cost and complexity of actual physical cables being run to numerous locations (which can even be impossible for hard-to-reach locations within a building).
§  Expandability – Wireless networks can serve a suddenly-increased number of clients with the existing equipment. In a wired network, additional clients would require additional wiring.
§  Cost – Wireless networking hardware is at worst a modest increase from wired counterparts. This potentially increased cost is almost always more than outweighed by the savings in cost and labor associated to running physical cables.

Disadvantages of Wifi – For a given networking situation, wireless LANs may not be desirable for a number of reasons. Most of these have to do with the inherent limitations of the technology.
§  Security – To combat this consideration, wireless networks may choose to utilize some of the various encryption technologies available. Some of the more commonly utilized encryption methods, however, are known to have weaknesses that a dedicated adversary can compromise.
§  Range – The typical range of a common 802.11g network with standard equipment is on the order of tens of meters. While sufficient for a typical home, it will be insufficient in a larger structure. To obtain additional range, repeaters or additional access points will have to be purchased. Costs for these items can add up quickly.
§  Reliability – Like any radio frequency transmission, wireless networking signals are subject to a wide variety of interference, as well as complex propagation effects that are beyond the control of the network administrator.
§  Speed –  The speed on most wireless networks (typically 1-54 Mbps) is far slower than even the slowest common wired networks (100Mbps up to several Gbps). However, in specialized environments, the throughput of a wired network might be necessary.


No comments:

Post a Comment