By clicking “Check Writers’ Offers”, you agree to our terms of service and privacy policy. We’ll occasionally send you promo and account related email
No need to pay just yet!
About this sample
About this sample
Words: 398 |
Page: 1|
2 min read
Published: Jul 30, 2019
Words: 398|Page: 1|2 min read
Published: Jul 30, 2019
Wireless LAN is the type of networking which does not involves cables or physical connectivity of devices for achieving networking. It helps to avoid introduction of costly hardware included in conventional networking.
Rather than cables and physical connections “Radio waves and frequency” is used as a communication medium between devices for transmitting and sharing data between them and it also includes the internet access points. It makes for user very easy to move around the coverage area of these radio waves without losing internet connection or any interruption. In the mid of 90’s it was totally impossible to imply WLAN everywhere as it was very expensive and was only used in the circumstances where physical networking connections were not possible. But great evolution has been observed in the field of WLAN. Every participant at WLAN falls in any one out of these two categories i.e. access point or client.
There are yet four major types of wireless networking available in the world. These include LAN, WAN, MAN and PAN.
Radio frequency based networking involves two major components that are sender and receiver of the waves. Here electromagnetic waves are sent and received through sender and receiver respectively. Radio waves could travel in all directions in the form of ripple which helps to form the coverage area of the Wireless networking.
Understating of frequencies in very important for the IT manager of company, in order to cope up with security challenges. By knowing frequency of the equipment deployed IT manger becomes entitled of knowing that what level of interference can bring the distortion in the system and could cause jamming or facilitate any hacking attack. In case if hacker is trying to jam one frequency the system could switch to the other.
As the wireless networking evolved and now it is available everywhere so it also brought few embedded threats associated with data protection and unauthorized accessibility. Unfortunately these wireless networking systems are highly vulnerable to security risks as no physical barriers could be formed in order to make the set up more secure and threat free. This unauthorized access could damage the devices, hack the confidential information and misuse the wireless networking system.
There are several cyber threats involved in wireless networking. These vulnerabilities include default Wi-Fi routers, Rouge access points, wireless zero configuration, weak WEPs, clear text encryption passwords and malicious code etc.
Browse our vast selection of original essay samples, each expertly formatted and styled