Introduction
In today’s technological culture the term Wi-Fi is omnipresent and almost every device intended to connect to the internet has corresponding hardware. In the following chapters the components of this transmission standard will be examined and the basic concepts explained. The specifications and changes to this standard are extensive and therefore only the most important aspects are considered. The information originates from the IEEE standardization committee and two independent and recently published books. The standard will be explained, followed by the historical details and the protocol changes over time. After this the actual use and functionality is described and in the end will be a look at future trends.
The IEEE 802.11 standard
In today’s technological culture the term Wi-Fi is omnipresent and almost every device intended to connect to the internet has corresponding hardware. But the term Wi-Fi, standing as a synonym to wireless internet in general English, is actually well-defined. The term Wi-Fi is based on the Institute of Electrical and Electronics Engineers' (IEEE) 802.11 standards. But because the IEEE is not involved in verification and testing the Wi-Fi Alliance had to be created. Wi-Fi is now trademarked by the Wi-Fi Alliance and only products that pass the interoperability certification test are allowed use their logo. This ensures that all devices from different manufactures will successfully work together.
-History
As Perahia explains, the first draft of the now known 802.11 standard took seven years of development and its first version was ratified in 1997 by the Institute of Electrical and Electronic Engineers (IEEE). The adaption of the new technology was slow, as there were very little devices...
... middle of paper ...
...ecting devices to a network, has recently been determined as a flawed security standard that can be used to gain access to the network.
Another important factor is reliability which is not guaranteed. It is very simple to deliberately interfere with wireless connections, but even without malicious attempt this is a common issue. Microwaves for example have a strong impact, but also depending on other Wi-Fi devices in close proximity the data rate can decrease immensely.
Conclusion
With the wireless transmission standard 802.11 originating from IEEE, which is often just called Wi-Fi access to the internet has simplified drastically. The key points to its success are the continuous improvement and adaptions to changing demands but also the ease of use accomplished by the interoperability of different devices and also the backward compatibility of each new extension.
During a conversation last year with a Houston-based network administrator, I asked, “Is wire sniffing at some random public WiFi hotspot illegal?” “No, not at all. It’s just passive…and besides, anyone stupid enough to pass their sensitive information over an unsecure network gets what they deserve.” As it turns out, he was wrong, but he’s not alone in his confusion.
The only way to remember is by holding onto the initial trigger that has caused for such a strong bond to be created. A sport can cause for a father daughter relationship to grow much stronger. The initial trigger of the bond is to watch, play, and enjoy. When a loved one is lost the passion of a sport will allow for this bond to only grow stronger. To come to the realization that a loved one is lost they must first remember what brought them together. In Shoeless Joe by W.P. Kinsella the love for baseball that has been passed on from Ray to Karin in which it was so strong, it causes for them to be inseparable.
J. A. Gutierrez ,M. Naeve , E. Callaway , M. Bourgeois ,V. Mitter and B. Heile "IEEE 802.15.4:adeveloping standard for low-power low-cost wireless personal area networks", IEEE Network, vol. 15, no. 5, pp.12 -19 2001
A reason why Wi-Fi is the most important invention is because of safety. I can go on CNN's or NBC's website and find out about what is happening in the world, not only that, I can find out what is happening in my region. I have the ability to read about storms, such as hurricanes or blizzards that can affect me. I can also sign up for alerts that are sent right to my phone immediately warning me. In the summer there was a heavy rainstorm. Trees were falling down and it was dangerous. I received a tornado alert on my phone, because of that I knew that a tornado and power outage could take place anytime. Also, I can find shootings or fires that have happened or are happening in my neighborhood. It is much harder to be safe and alert of weather conditions without Wi-Fi.
Think about it. You¡¦re surfing the Net at home or in the office, and someone just hops onto your network connection. With information about whether or not WEP is disabled and SSID default settings, an unauthorized user could access your documents, financials or other sensitive information.
This informational report will explain and guide you through the process and plan that will be implemented to prevent any unauthorized equipment (including external rogue switches) from entering the network. In addition we will be implementing the spanning tree protocol to eliminate any layer 2 loops and ultimately causing a network storm.
The propose research will address a problem confronting many two year institutions in the present-day (i.e. how to best plan, design, and implement WLAN technologies). While WLAN technologies offer the benefits of mobility, reduced installation time, and decreased cost, many challenges must be met by institutions deploying them (Geier, 2005). These issues are related to security, speed, interoperability, and equipment selection, ease of use, reliability, signal interference, installation, and health risks.
Ultimately the end users turn out to be the weak link in the security chain as they ignore the latest security trends and install outdated devices that do not support the latest security features. An example would be that of an outdated wireless router that does not support WPA encryption. By proposing a simple solution that lets the users configure their wireless access points for best possible security, the problem can be nipped in the bud.
Bring Your Own Device programs do not seem like a practice that too many corporations in America will shift to. I always thing people in America are too lazy, BYOD seems like you will be doing homework for the rest of your life. It makes sense for management and higher up people. The general office workers I’m not so sure. For some people it would be very productivity for others, I’m not sure.
Wi-Fi (Wireless Network) or 802.11 networking is a phenomenal way of providing Internet wirelessly at a low cost. Using radio waves, a wireless network connects a PC, mobile phone or just about anything that connects to the internet wirelessly by a router. By transmitting signals at 2.4 or 5 GHz it allows the waves to transmit more data at a faster rate. Typical Wi-Fi standards are 802.11a, b, g, n, or ac and they can switch up the frequency depending on the model (Brain). Families can create their own wireless network that can be shared between family members without the use of hooking all their devices up to the modem and can also protect their home network from potential hackers with the use of a TKIP or AES encryption. Businesses can also create a “hotspot” which is an area that has wireless networks for free or at a set fee. This is extremely convenient for commuters that need internet access while they are at work, waiting on a plane, or just sitting at a coffee spot without the need for wires(Cox).
Wireless is everywhere today whether at home working from your WIFI network to work where you might be linked a wireless network or even through your phone through a 3G or 4G network to connecting to an open wireless networks. As you can see for the most part people are connecting to wireless from the moment they leave their home till they get to work and then back. While wireless comm...
Wired ones are practically safer. At least as far as interception is concerned. But all about how we used our wired network system. And what types of wire we used. The quite of wire used though, the standard copper wire can be easily manipulated and data packets stolen, optical fibers are way safer though. In one way we cannot be sure of being safe ever. The internet is a rapidly growing field and securing the flow of data is surely getting harder day by day. Wireless is ideal for providing network access in meetings or common areas and can also be used to offer internet access to visitors. There is a number of wireless networking standards too. Try to get a wireless router or acc...
Accessing the cyberspace is the first right should be granted in order to have privilege of and exercise the rest of the human rights on the internet. The internet has a very big impact in people’s life and what they have become today, especially with all the opportunities this medium provide for them to exercise their basic human rights. It has allowed the freedom of many voices to be heard in ways that was merely impossible before this revolution. Not only it has given people the rights to express and associate, but also the right to education as it allows to access many educational materials. In fact, accessing this virtual place has become a necessity to fulfill many other human rights including the right to work, and the right to take part in country’s government. Therefore, internet access should be a public right that ensure information and internet accessibility, usability, and availability for all people regardless of gender, place, and income.
The downside of this technology is the potential for security problems. Intruders can see packets traveling on a network and can perhaps interpret them to obtain confidential information.
Technology is the way which extends humans ability. It is very difficult to obtain a precise definition of technology. It is generally accepted that "technology" is more than just a collection of physical products of science. "Technology" is the link between society and its tools.