Let's now talk about the wireless networks devices.
What are the devices that can communicate wirelessly?
Let's start by the wireless excess point. The wireless Excess Point is a networking hardware device. As shown in the picture, it connects the mobile devices to the wild infrastructure. From one side, it is connected toe the registration jack 45 to the other side
it is connected to an antenna.
So this antenna is used for wireless communication, and the R J 45 is used as an Ethernet interface for the wired infrastructure. So it has the interfacing between the wild infrastructure and the wireless
network through the antenna and the Audrey 45 existing in the same device.
The access point is a layer to device. It works in the physical and datalink layers.
The coverage area depends on the antenna
on the number of antenna existing in this wireless access point
and the strength of each of its antenna. Off course wireless excess point with one antenna covers less area than
wireless. Excess point, with two and two is less than four and four is less than six and off course
each. Anton has its strength and its coverage area. So the antenna, its number and its strength determines, to a great extent the coverage area off this wireless excess point.
We have several exits. Points
manufactured by several known vendors for networking devices, Cisco and other companies has produced a very well known names for excess points such as well away and other networking companies.
It may contain a D. A cell and router in the same box. This is a wireless point for home connections, the one that contains the SL and the router. It is
variety off devices that are contained inside one box. So this the SL is connected to the
telephone line and the router is connected to
They're a splitter, and then
each of these devices interact toe. Get the wireless device inside your home connected to the Internet.
The water's excess point can support several standards off the WiFi A, B, G and and standards.
It can be divided into several radio channels to avoid interferes between the channels. It is communicated with each other. This excess point can act on Channel five, and the adjacent excess point can act on Channel seven, so we leave Channel six in between unused
so as to avoid interference between the communication challenge.
One excess point can hold several SS ID's either broadcasted or hidden.
The speed and coverage of the excess point depends on the brand and model of the manufacturers.
bigger area and can have a hard speed.
The excess point signals can be obstructed by wolves and can be
stopped by by long distances.
This wireless signals can be reflected by walls and cannot bypass walls, and
susceptible toe being weakened through long distances.
It can be configured through its firmware directly through tell not, for example, or any other communication that can directly
sets the configuration and saves the configuration over the firmware or the configuration can be Web based.
The excess point can show a Web interface that can be used by the user toe. Configure it to determine the channel to determine
their encryption protocol that will be used by this excess point and other settings. For this excess point,
the excess point can receive its power over the ether ether lad connection. It can use the power over Ethernet concept Toby powered if it is in the ceiling or in some place that is hard to connect power to it.
The security features inside the wildest excess point are many.
The S S I D itself can be hidden so it is not exposed to the attacker.
filtering based on several parameters, it can filter the traffic based on Mac addresses or based on I p addresses or based on port numbers, which means that it can filter that http service. Based on Port number 80
it can filter some domain names to access the network from inside to outside or vice versa.
Excess points use encryption techniques to communicate between the device and the excess point. The mobile device and the excess point can transmit and receive signals using the Web wireless encryption protocol, the W P. A or the A s protocols.
Those three are encryption protocols that are used to encrypt the traffic
between the wireless excess point and between the communicating mobile device wirelessly.
The A s is the most recent encryption protocol among these three.
Let's have a look at the configuration off wireless excess point. This is the configuration. Paige. This is the page that appears when configuring the excess point through Web interface. As you can see, you can enable villain. You can determine the SS I D.
You can determine the operation mode. You can determine the channel of communication, and you can
from the media on the left. Determine the security features that you want to apply over this wireless excess point. Namely, you can determine the Mac filtering, which make addresses to filter and which make addresses to pass, which I P addresses the filter and which I P addresses to pose and which domain names the filter and which domain names the path
you can monitor the throughput. You can have statistics about the wireless communications, and you can have
several features toe configure
through this excess point.
Using that Web interface speech,
let's have another device that can connect your
network wirelessly, which is the USB modem. It connects species laptops through the GSM network via mobile operator so it is inserted inside the PC or the laptop tow. Connect this PC or laptop. Tow the mobile operator company through the GSM letter.
It depends on the network generation, so the speed
can either be three G or can be faster using the four g or anti network. It needs no world infrastructure. It can be inserted inside the laptop with no wired infrastructure to connect this laptop toe that
Internet directly through the wireless infrastructure.
Off course, this USB modem has charging fees according to your subscription, Tow your mobile subscriber and your mobile letter. You should pay for this traffic
passing through the GSM network your subscribed to So it is ghostie than the WiFi network.
It has less network speed than the WiFi,
it uses more power off that
mobile device, such as the laptop or smartphone, more power than the WiFi It allows more flexibility and mobility says it can be connected anywhere covered by the mobile network
and the mobile operator. So it allows more flexibility and mobility. And it can be connected through streets and through remote areas just covered by the mobile network Operator.
Smartphones are the terminals that are most commonly connecting tow the wireless network, Smart forth and laptops are the in terminals. In a wireless network,
it's spreading fast over the world. We have so many statistics that says the smartphones are penetrating that markets off several countries, and it is
increasingly spreading over the world in number
type and number off users.
It can be connected to the Internet through WiFi. It can be connected through the GSM network. It can be connected to other more mobile devices through the Bluetooth.
It can also act as hot spot that can can connect other devices through it to the Internet can act as the excess point for other devices to the Internet, and this excess point can connect them through the GSM network.
WiFi is less battery consuming, then GS and in smartphones. If you connect through your smartphone toe WiFi and connect to the Internet, you will consume less battery than
connecting to the Internet. Using the GSM network charges four Gs and depends on your subscription. You either pay a monthly subscription and uses the Internet according to the subscription, or you can either pay as you go pay. As you download Perez. You pay as you use
the G s, a mop territory, or subscribe to and use whatever service is you can use offered by this mobile operator.