Wi-Fi technology and its application in Business organizations
Objective
To understand the Wi-Fi technology and its applications in Indian business organisations
Introduction
In today’s high-tech world connectivity to networks is extremely important for organizations to survive. Networking is possible of various machines like computers, laptops, cell phones etc.
This term paper talks of Wi-Fi, the wireless technology that allows internet connection to be broadcasted through radio waves. Its purpose serves directly to the users looking for internet access devoid of any cords or wires.
What is Wi-Fi?
Wi-Fi is a wireless technology brand that is owned by Wi-Fi Alliance
Wi-Fi Alliance is a consortium of separate and independent companies agreeing to a set of common interoperable products based on the family of IEEE 802.11 standards. Wi-Fi certifies products via a set of established test procedures to establish interoperability. Those manufacturers that are members of Wi-Fi Alliance whose products pass these interoperability tests can mark their products and product packaging with the Wi-Fi logo.
How does Wi-Fi work?
Radio waves are the keys which make Wi-Fi networking possible. These radio signals are transmitted from antennas and routers and are picked up by Wi-Fi receivers such as computers and cell phones that are equipped with Wi-Fi cards. Whenever a computer receives any of the signals within the range of a Wi-Fi network which is usually 300 – 500 feet for antennas and 100 – 150 feet for routers, the Wi-Fi card will read the signals and thus create an internet connection between the user and the network without the use of a cord. Usually the connection speed is increases as the computer gets closer to the main source of the signal and decreases when the computer gets further away.
Many new laptops already come with a Wi-Fi card built in it.
Wi-Fi cards can be external or internal, meaning that if a Wi-Fi card is not installed in the computer, one may purchase a USB antenna attachment and have it externally connect to the USB port, or have an antenna-equipped expansion card installed directly to the computer.
Laptops without a built in Wi-Fi card is usually installed the external way while PCs have it installed internally. Once a connection is established between the user and the network, the user will be prompted with a login screen and password if it is a fee-based type network. Though there’re also free-based network connections as well in some areas.
Wi-Fi networking around the world is creating hot spots in cities where anyone with a laptop can wirelessly plug into the internet.
To secure the network setup, WPA2 can be used along with the optional Pre-Shared Key (PSK) for authentication. To encrypt the network with WPA2-PSK, the router is configured not with an encryption key but rather plain paraphrase. TKIP(for Temporal Key Integrity Protocol) is used along with the network SSID for generating unique encryption key for the wireless clients.
Wireless networks – While the term wireless network may technically be used to refer to any type of network that is wireless, the term is most commonly used to refer to a telecommunications network whose interconnection between nodes is implemented without the use of wires, such as a computer network. Wireless telecommunication networks are generally implemented with some type of remote information transmission system that uses electromagnetic waves, such as radio waves, for the carrier and this implementation usually takes place at the physical level or “layer” network.
WISP is the next generation of wireless internet and the leader in wireless technologies for tribal community, school, business, and entertainment. The new WISP business will employ top of the line products and provides exceptional technical and unmatched services exceeding those of traditional service providers, such as Comcast, AT&T, and Direct TV. The tribal WISP will enable people in rural communities to be connected to mainstream media and level the playing field. This, in turn, will provide economic development opportunities and will improve their quality of life for the Tachi Yokut
Municipal Wi-Fi generally refers to the perception of turning an entire city or region into a wireless access zone with a goal of making wireless internet access a universal service (Delta and Matsuura 17). Municipal Wi-Fi is in most instances deployed in large parts of the municipal area or the whole of it by employing a wireless mesh network, which uses hundreds of outdoor routers on utility poles. Recently, there have been struggles for municipal Wi-Fi on whether it should be pursued or not, since the efforts to provide it free has proved futile. This leads to the question whether the municipal Wi-Fi should be pursued. If so, should it be left to the private sector, the government or both? This paper seeks to answer these questions.
WiMax has the potential of replacing cellular networks, copper wire networks used by telephone companies, and the coaxial cable infrastructure use by cable TV while offering Internet Service Provider (ISP) services. Relevance of trend: Broadband wireless access (BWA) and in particular WiMax is being
Roberts, Richard M. "Network Secrurity." Networking Fundamentals. 2nd ed. Tinley Park, IL: Goodheart-Willcox, 2005. 599-639. Print.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
Wi-Fi facilitates ease of use and is getting increasingly popular with homes and businesses. Multiple Wi-Fi Access Points can be located in a given area. Wi-Fi security issues continue to be a problem, as the number of Access Points grows.
Anyone that has worked with a computer on a network has at some point been exposed to the 802 standards. The 802 standards developed by the Institute of Electrical and Electonics Engineers for the primary use in the computer and electronics industry. The IEEE 802 standards for local area networks are widely followed. The IEEE only establishes the standard. The industry leaders in network technology have for the most part accepted these standards and develop their products to meet these standards.
Print. The. Gordon A. Gow, and Richard K. Smith. Mobile and wireless communications: an introduction, McGraw-Hill International, 2006. Print.
Wireless technology has come from the basics of cellular usage to sensors in the medical field. Wires are now a thing of the past in today’s world with technology forever revitalizing. Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing wireless Internet at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly via a router.
Local Area Networks also called LANs have been a major player in industrialization of computers. In the past 20 or so years the worlds industry has be invaded with new computer technology. It has made such an impact on the way we do business that it has become essential with an ever-growing need for improvement. LANs give an employer the ability to share information between computers with a simple relatively inexpensive system of network cards and software. It also lets the user or users share hardware such as Printers and scanners. The speed of access between the computers is lighting fast because the data has a short distance to cover. In most cases a LAN only occupies one or a group of buildings located next to each other. For larger area need there are several other types of networks such as the Internet.
ABSTRACT : This paper describes the basic threats to the network security and the basic issues of interest in designing a secure network. it describes the important aspects of network security. A secure network is one which is free of unauthorized entries and hackers. INTRODUCTION
Networks in organisation are dynamic and complex entities which can be quite challenging to configure and manage. (Kim & Feamster 2013). These corporate networks consist of multiple routers, switches, firewalls, middleboxes and a particular advantage of network management is the ability to monitor the entire business network. As all the devices are interconnected with many event occurring simultaneously, problems with once device can eventually lead and spread throughout...
The connectivity that I mean is an internet connection. There are several components that are used to connect the computers to the internet, such as modem, Digital Subscriber Line (DSL), wireless, etc.