CompTech-213-Topic-6-Wireless-Technology
CompTech-213-Topic-6-Wireless-Technology
Wireless Telephone
The world's first wireless telephone conversation occurred in 1880, when Alexander Graham
Bell and Charles Sumner Tainter invented and patented the photophone, a telephone that
conducted audio conversations wirelessly over modulated light beams (which are narrow
projections of electromagnetic waves).
Bluetooth Technology
Bluetooth technology allows you to connect a variety of different electronic devices wirelessly
to a system for the transfer and sharing of data and this is the main function of Bluetooth. This
one-to-many communications has made Bluetooth technology the preferred method over IR
for connecting computer peripherals such as wireless mice, keyboards, headphones and
printers.
Microwave
Microwave is an effective type of wireless data transmission that transfers information using
two separate methods. One is the satellite method that transmits information via a satellite
that orbits 22,300 miles above the Earth with transmit data frequency ranging from 11 GHz to
14 GHz and with a transmission speed of 1 Mbps to 10 Mbps. Another method is a terrestrial
method, in which two microwave towers with a clear line of sight.
Infrared (IR)
Infrared is a media transmission system that transmits data signals through light emitting
diodes (LEDs) or Lasers. Infrared (IR) is relatively low energy and cannot penetrate through walls
or other obstacles. However, it is commonly used to connect and move data between devices
such as Personal Digital Assistants (PDAs) and PCs.
Satellite
Satellite communication is one of the wireless technologies, which is widely spread all over the
world allowing users to stay connected virtually anywhere on the Earth. The Satellites used in
this mode of communication, communicate directly with the orbiting satellites via radio signals
1
Wireless LAN Components
There are various components that must be considered in a WLAN including: a wireless client or STA, an Access Point, a
Wireless Bridge, Antenna and other wireless devices.
Wireless Client
Any host device that can participate in a wireless network either mobile or stationary. Most devices
that can be connected to a traditional wired network can be connected to a WLAN if equipped with
the proper wireless NIC and software.
Wireless Bridge
Used to connect two wired networks through a wireless link, which allows long range point-to-point
connections between networks.
Wireless Adapters
Wireless adapters are hardware devices that are installed inside computers which enables wireless
connectivity. If a computer does not have a wireless adapter, it will not be able to connect to a router
in order to access the Internet. Some computers have wireless adapters built directly into the
motherboard, while it is also possible to install stand-alone wireless adapters to add wireless
capability to a computer that doesn’t have a built-in facility.
Wireless Router
A wireless LAN router adds a built-in access point function to a multiport Ethernet router. This combines
multiple Ethernet networks with wireless connections. A typical wireless LAN router includes four
Ethernet ports, 802.11 access point, also provides table of IP Address for DHCP configuration.
Access Point
Controls access between a wired and a wireless network. Allows wireless clients to gain access to a
wired network and vice versa. Acts as a media converter accepting the Ethernet frames from the wired
network and converting them to 802.11 compliant frames before transmitting them on the WLAN.
Wireless Repeaters
Access points, which require interconnecting cabling, generally play a dominant role for providing
coverage in most wireless LAN deployments. Wireless repeaters, however, are a way to extend the
range of an existing wireless LAN instead of adding more access points. There are few standalone
wireless LAN repeaters on the market, but some access points have a built-in repeater mode.
Antennas
It increases the output signal strength from a wireless device of AP and Bridges. It also receives wireless
signals from other devices such as STAs. Increase in signal strength from an antenna is known as the
gain, higher gains usually translate into increased transmission distances. Directional antennas
concentrate the signal strength into one direction. Omni-directional antennas are designed to emit
equally in all directions.
Radio
The radio system is one type of wireless data transmission, and it is a wireless media that transfers data
by carrying electromagnetic waves with low frequencies to distant locations through an electrical
conductor and an antenna. The transmission frequency for information transmitted through a radio
system ranges from 10 kilohertz (kHz) to 1 gigahertz (GHz), and the frequencies are regulated by the
Federal Communications Commission (FCC).
2
Benefits/Advantages of Wireless Connections
• Mobility – allows for easy connection on both stationary and mobile clients.
• Scalability – can be easily expanded to allow more users to connect and to increase coverage area.
• Flexibility – provides anytime, anywhere connectivity, especially internet.
• Cost Savings – cost less for installation and maintenance
• Reduce Installation Time –reduce its time off installation from cabling and provide connectivity for many clients.
• Reliability in Harsh Environment – easy to install in time of emergency in hostile places.
• Internet Accessibility - can be accessed from anywhere and at any time without the need to carry cables or wires.
• Medical Application - helpful for Doctors, workers and other professionals working in remote areas as they can be in
touch with the medical centers through wireless communication.
Despite the flexibility and benefits of wireless, there are some limitations and risks.
One way to illustrate this difference is to partition the use cases based on their "geographic range”.
3
NETWORK GENERATIONS
Zero Generation - 0G
Mobile radio telephone, the systems that preceded modern cellular mobile
telephony technology. OG (Zero Generation) is also known as Mobile Radio
Telephone system. As this generation was invented prior to cellular system it was
mentioned as pre cellular system. Generally Mobile Radio Telephone system
provides half duplex communications i.e. only one person will speak and other should
hear.
First Generation - 1G
1G (or 1-G) refers to the first generation of wireless telephone technology (mobile
telecommunications). These are the analog telecommunications standards that were
introduced in the 1980s and continued until being replaced by 2G digital
telecommunications. The main difference between the two mobile telephone
systems (1G and 2G), is that the radio signals used by 1G networks are analog, while
2G networks are digital.
Second Generation - 2G
2G (or 2-G) is short for second-generation wireless telephone technology. Second generation 2G cellular telecom networks
were commercially launched on the GSM standard in Finland by Radiolinja (now part of Elisa Oyj) in 1991. 2G is digitally
encrypted, with far greater mobile phone penetration levels, and 2G introduced data services for mobile, starting with SMS
text messages. 2G technologies enabled the various mobile phone networks to provide the services such as text messages,
picture messages and MMS (multimedia messages).
Third Generation - 3G
3G, short form of third generation, is the third generation of mobile telecommunications technology. 3G has application in
wireless voice telephony, mobile Internet access, fixed wireless Internet access, video calls and mobile TV.
Fourth Generation - 4G
4G provides, in addition to the usual voice and other services of 3G, mobile broadband Internet access, for example to laptops
with wireless modems, to smartphones, and to other mobile devices. Potential and current applications include amended
mobile web access, IP telephony, gaming services, high-definition mobile TV, video conferencing, 3D television, and cloud
computing.
Fifth Generation - 5G
5G denotes the next major phase of mobile telecommunications standards beyond the current 4G/IMT-Advanced standards.
It will make Unified global standard. The Physical and Data Link layer defines the 5G wireless technology indicating it as an
Open Wireless Architecture (OWA).The 5G technology also maintain virtual multi-wireless network. 5G brings forward a real
wireless world-Wireless World Wide Web (WWWW)
The SSID is a case-sensitive, alpha-numeric string that is up to 32-characters. It is sent in the header of all frames transmitted
over the WLAN. The SSID is used to tell wireless devices which WLAN they belong to and with which other devices they can
communicate. Regardless of the type of WLAN installation, all wireless devices in a WLAN must be configured with the same
SSID in order to communicate.
4
Security Consideration on a Wireless LAN
Why People Attack WLANs
One of the primary benefits of wireless networking is ease and convenience of connecting devices. Unfortunately, that ease
of connectivity and the fact that the information is transmitted through the air also makes your network vulnerable to
interception and attacks.
With wireless connectivity, the attacker does not need a physical connection to your computer or any of your devices to
access your network. It is possible for an attacker to tune into signals from your wireless network, much like tuning into a
radio station. The attacker can access your network from any location your wireless signal reaches. Once they have access to
your network, they can use your Internet services for free, as well as access computers on the network to damage files, or
steal personal and private information. These vulnerabilities in wireless networking require special security features and
implementation methods to help protect your WLAN from attacks.
One easy way to gain entry to a wireless network is through the network name, or SSID. All computers connecting to the
wireless network must know the SSID. By default, wireless routers and access points broadcast SSIDs to all computers within
the wireless range. With SSID broadcast activated, any wireless client can detect the network and connect to it, if no other
security features are in place. The SSID broadcast feature can be turned off. When it is turned off, the fact that the network
is there is no longer made public.
Wireless Security
MAC Address Filtering
MAC address filtering uses the MAC address to identify which devices are allowed to connect to the
wireless network. When a wireless client attempts to connect, or associate, with an AP it will send
MAC address information. If MAC filtering is enabled, the wireless router or AP will look up its MAC
address a preconfigured list. Only devices whose MAC addresses have been prerecorded in the
router's database will be allowed to connect. If the MAC address is not located in the database, the
device will not be allowed to connect to or communicate across the wireless network.
Authentication on a WLAN
Another way to control who can connect is to implement authentication. Authentication is the process of permitting entry to
a network based on a set of credentials. It is used to verify that the device attempting to connect to the network is trusted.
The use of a username and password is a most common form of authentication. In a wireless environment, authentication
still ensures that the connected host is verified, but handles the verification process in a slightly different manner.
Authentication, if enabled, must occur before the client is allowed to connect to the WLAN. There are three types of wireless
authentication methods: open authentication, PSK and EAP.
Open Authentication
By default, wireless devices do not require authentication. Any and all clients are able to associate regardless of who they
are. This is referred to as open authentication. Open authentication should only be used on public wireless networks such as
those found in many schools and restaurants. It can also be used on networks where authentication will be done by other
means once connected to the network.
5
Wired Equivalency Protocol (WEP)
Wired Equivalency Protocol (WEP) is an advanced security feature that encrypts network traffic as it travels through the air.
WEP uses pre-configured keys to encrypt and decrypt data. A WEP key is entered as a string of numbers and letters and is
generally 64 bits or 128 bits long.
Wireless Standard
It is necessary to consider several factors when determining which WLAN standard to use.
The most common factors include: bandwidth requirements, coverage areas, existing
network implementations, and cost. This information is gathered by determining end-
user requirements.
Bandwidth, even if the applications do not require a high-speed connection, one of the
higher-speed technologies may be necessary if multiple users are connecting at the same
time. Different standards support different coverage areas. The 2.4 GHz signal, used in
802.11 b/g/n technologies, travels a greater distance than does the 5 GHz signal, used in
802.11a technologies. Thus 802.11 b/g/n supports a larger BSS. This translates into less equipment and a lower cost of
implementation.
The existing network implementation also affects new implementation of WLAN standards. For example, the 802.11n
standard is backward compatible with 802.11g and 802.11b but not with 802.11a. If the existing network infrastructure and
equipment support 802.11a, new implementations must also support the same standard.
Cost is also a factor. When considering cost, consider Total Cost of Ownership (TCO) which includes the purchase of the
equipment as well as installation and support costs. In a medium to large business environment, TCO has a greater impact on
the WLAN standard chosen than in the home or small business environment. This is because in the medium to large business,
more equipment is necessary and installation plans are required, increasing cost.
References
https://www.efxkits.us/different-types-of-wireless-communication-technologies/
https://support.metageek.com/hc/en-us/articles/200971094-Wi-Fi-Security-Types
http://etutorials.org/Networking/wn/Chapter+5.+Wireless+LANs+Networks+for+Buildings+and+Campuses/Wireless+LAN+Components/
https://www.edgefx.in/different-types-wireless-communication-technologies/