Wireless Technologies (Lesson 3) Flashcards
provides the ability to communicate between two or more entities over distances without the use of wires or cables of any sort.
Wireless Technology
Discovered the electromagnetics waves.
Heinrich Hertz (1857 - 1894)
established the very first commercial RF communications, the wireless telegraph, in the late 1890s.
Guglielmo Marconi (1874-1937)
developed the morse code
Samuel F. B. Morse (1791-1872)
Types of Wireless Technologies (6)
- Satellite Communication
- Infrared Communication
- Broadcast Radio
- Wi-Fi
- Microwave Communication
- Bluetooth Technology
intelecommunications, the use of artificial satellites to provide communication links between various points on Earth.
Satellite Communication
Approximately ____ artificial satellites orbiting Earth.
(how many daw na satellites)
2000
Components of Satellite Communication (2):
- Space Segment
- Ground Segment
means the satellites and related facilities and equipment used to support the operation of satellites owned or leased by INTELSAT,Inmarsat, or a separated entity or successor entity.
Space Segment
consists of fixed or mobile transmission, reception and ancillary equipment and the space segment, which mainly is the satellite itself.
Ground Segment
communication information in a device or systems through infrared radiation
Used for TV remote control, security control a communication which stays within a short range.
Infrared Communication
is sound communication by radio waves, usually through the transmission of music, news, and other types of programs from single broadcast stations to multitudes of individual listeners equipped with radio receivers.
Broadcast Radio
Wi-Fi was invented by ____? in the Netherlands in 1991.
NCR Corporation/ AT & T
By using this technology we can exchange information between two or more devices.
Wi-Fi (Wireless Fidelity)
Types of WiFi Technology
- Wi-Fi- 802. 11a
- Wi-Fi-802. 11b
- Wi-Fi-802. 11g
- Wi-Fi-802. 11n
is one of a series of wireless technology. That defines the format and structure of the radio signals sent out by WI-FI networking routers and antennas.
Wi-Fi-802.11a
support bandwidth 11mbps.
The signal in the unregulated frequency spectrum around 2.4 GHz.
This is a low frequency compared with Wi-Fi-802.11a means it is working a reasonable distance.
Wi-Fi-802.11b
In 2002 and 2003, This Technology supporting newer slandered products.
It is the best technology of 802.11a and 802.11b.
Wi-Fi-802.11g
is the newest WIFI technology.
It was designed to improve on 802.11g. It supports 100 Mbps bandwidth and increased signal intensity.
Wi-Fi-802.11n
Elements of Wi-Fi
- Wireless Access Point
- WiFi Cards
- Safeguards
is used to allow wireless devices for connecting to the wireless network.
Uses the bandwidth to stretch so that several devices can travel on the network from a far distance.
Wireless Access Point
These cards allow the wireless signal as well as the information of the relay that can be internal or external.
Also knows as adapters.
Wi-Fi Cards
Limitations of WiFi (4):
- Range is limited
- Interface from other devices like microwave ovens, telephones, etc.
- Power consumption is high
- Risks of data security
WiFi Technology Advantages (6):
- A wireless laptop can be moved from one place to another place.
- Wi-Fi network communication devices without wire can reduce the cost of wires.
- Wi-Fi setup and configuration is easy than the cabling process.
- It is completely safe and it will not interfere with any network.
- We can also connect internet via hot spots.
- We can connect internet wirelessly.
WiFi Technology Disadvantages (4):
- Wi-Fi generates radiations which can harm the human health.
- We must disconnect the Wi-Fi connection whenever we are not using the server.
- There are some limits to transfer the data, we cant able to transfer the data for long-distance.
- Wi-Fi implementation is very expensive when compared to the wired connection.
Applications of WiFi Technology (7):
- Mobile Application
- Business Application
- Home Application
- Computerized Application
- Automotive Segment
- Browsing Internet
- Video Conference
an electromagnetic wave with a wavelengthin the range 0.001–0.3 m, shorter than that of a normal radio wave but longer than those of infrared radiation.
Are used in radar, in communications.
Microwave Communication
a standard for the short range wireless interconnection of mobile phones, computers, and other electronic devices.
Bluetooth Technology
as the name suggests, is basically a network topology that allows all wireless devices to communicate with each other through a common medium i.e. AP .
Basic Service Set (BSS)
Basic Service Set (BSS) Types (3):
- Infrastructure
- Independent
- MESH
is the protection of devices and networks connected in a wireless environment.
Wi-Fi Security
Ways to Protect a Wi-Fi network (4):
- Media Access Control (MAC)
- Encryption
- Virtual Private Network (VPN)
- Security Software
which restrict access to a Wi-Fi network.
Is a unique code or number used to identify individual devices on a network.
Media Access Control (MAC)
encodes data and then decodes it only for authorized recipients.
Encryption
They allow users to create secure, identity-protected tunnels between unprotected Wi-Fi networks and the internet.
Also can conceal a user’s IP address by using a virtual IP address.
Virtual Private Network (VPN)
software that also can provide Wi-Fi security, such as antivirus software.
Security Software
Types of Wireless Security Protocols (4):
- Wired Equivalent Privacy(WEP)
- Wi-Fi Protected Access (WPA)
- Wi-Fi Protected Access 2 (WPA2)
- Wi-Fi Protected Access 3 (WPA3)
The first wireless security protocol. It was the standard method of providing wireless network security from the late 1990s until 2004.
Wired Equivalent Privacy (WEP)
It delivers stronger encryption than WEP by using a security protocol known as Temporal Key Integrity Protocol(TKIP).
Wi-Fi Protected Access (WPA)
A new generation of WPA. is designed to deliver simpler configuration and even stronger encryption and security than any of its predecessors.
Wi-Fi Protected Access 3 (WPA3)
a later version of WPA, was developed in 2004. It’s easier to configure and provides even greater network security than WPA by using a security protocol known as the Advanced Encryption Standard (AES).
Wi-Fi Protected Access 2 (WPA2)
Types of Wi-Fi network Security Devices (4):
- Active Device
- Passive Device
- Preventive Device
- Unified Threat Management (UTM)
hardware configured to block surplus network traffic. Examples of these are firewalls, antivirus scanners, and content-filtering devices.
Active Device
detect and report on unwanted network traffic. They also have an extra layer of security because they can communicate with Wi-Fi routers only when the routers are seeking them.
That extra layer makes man-in-the-middle (MITM) attacks more difficult.
Passive Device
can scan networks to identify potential security issues, such as a wireless intrusion prevention system (WIPS).
Can be integrated into networks or overlaid using standalone sensors.
Preventive Device
incorporate vital elements of network security: firewalls, content filtering, VPN, antivirus detection, and others.
Offers a simplified way to integrate multiple security functions.
Unified Threat Management (UTM)