3 hours 38 minutes

Video Description

Wireless Network Drawbacks- Limitations in coverage

  • Walls
  • Long distances
  • Weather conditions
  • Higher bit error rate than wired
  • Less security in general

    • Open communications media for sniffing
  • Costs charging fees like GSM
  • Can not fully replace the wired infrastructure

Video Transcription

Now let's know some off the draw bags off the wireless networks and answer some of the review questions over thes two sections.
The wireless networks Throwbacks lies in the limitations in the coverage.
The area is covered by the wireless network is obstructed by wolves and long distances and sometimes weather conditions, such as in satellite communications and things like this. So wolves can obstruct the signals and can cause attenuation
and can cause reflection and refraction for the wireless signals.
Long distances can cause very strong attenuation for the wireless signal and may make it very weak. Toby heard correctly and to be utilized at the end
The weather conditions can act as, AH, weakening
for the wireless signal as well, and reflection and reflection. And
conditions can be obvious in the satellite communication.
The wireless network generally has a higher
bit rate higher than the corresponding wire network.
Wireless is in general less in the security features. This is because the communication media is the air. It is open for sniffing. It is susceptible to any listening device that can catch the signal intended from a certain sending device to a certain
receiving device and
interpreted and know its content because it is just in there, which is open for everyone. So sniffing is
probably very highly probable.
Sometimes the wireless network is very coast ian, charging like the GSM like the USB modem,
which uses the GSM network. So it depends on your subscription. Either you are monthly subscribed or you pay as you go so it can be caused the than the wired network.
It cannot fully replace the world infrastructure. The wireless network is to serve the mobility and the flexibility goals only, but it is hard and very rare to find another that is completely worlds. Even the mobile network. The mobile operator network, is
wireless only in the excess network, but it is wired in the court.
Many, many networks act like this. It is wireless, and the exercise toe offer mobility and flexibility what it is wired in the core toe
connect and to communicate between the fixit devices, the fixit connecting devices forming this letter.
Now let's have some review questions. What is the standard protocol over the Internet?
It's the TCP I P Protocol.
What does d c p i p stand for
T c P. I P stands for transmission control protocol. Internet Protocol. Many, many people studies this protocol and ignores knowing the meaning and knowing what does it stand for? And let's figure out here that the TCP i p
the word off the protocols so it is composed off the two most important protocols forming it
the TC people to call in Layer four and the I P Protocol in Layer Three than that We're clear.
What are the layers off the T. C P I p.
It's application, transport,
Internet or networking and knuckle access. As you can see only four layers. It is not like the OS I composed off seven layers. Some names are common, like the application, transport, Internet or network, and some names are not common like the Network Texas.
Let's recall here that the network access is forming off the physical and datalink layers of the eyes. O s I.
That internet is the same as the network layer. The transport is the same as the transport layer in both in the S I modern. The application here in the TCP I p is
corresponding tow three layers in the argo a Simon, the application, the presentation and the session Layer seven and layer six and layer five in the arduous I model are here corresponding toe one layer in the TCP I P, which is called the application layer. This is very important to record
name some off the application layer protocols in T c p i P. We can name several protocols working in the application layer off the TCP I P such as the http hypertext transfer protocol, the FTP, the file transfer protocol, the end as the domain name system protocol
and the SMTP the simple male transfer protocols. All of these are working in the application layer off the TCP I p. Let's hear recall that the application layer off the TCP I p is corresponding. Tow three layers off the arduous I model which our application presentation and session.
What are the port numbers used by each of the above protocols, respectively. Let's recall here that http use a sport number 80 ftp uses port number 21. The Enos uses fourth number 53 it can act either TCP or UDP
as empty. P uses sport number 25
these sport numbers
our identifies that exist in the transport layer that identifies the type of service requested from that line, tow the server toe, identify the type of data that needs to be transmitted between both machines. Http transfers text images
and hypertext FTP transfers, files
the N S transfers domain name queries and replied to result between I P addresses and me Name's SMTP is for the exchange off e mails between the mail servers and between the mail servers and email clients. What is the lens off the I P address in bits? What is the length of the I P addresses? It's 32 bits in virgin four
and 128 bits in virgin. Six.
This is the length of the I P address. Let's record here that the R P addresses a unique identifying, logical identify are bound to the geographical location off the machine.
What are the device is working in? Layer three are or what could be. The device is working in Layer three. The router is the most common device working in Layer three,
and later, three switches are another type of device is working in layer three layer three switches are somehow faster. It uses the hardware toe to perform the routing function.
How can the routing table build inside the route? It can be billed. Eyes are static, statically by the admin
entered by the admin off the network in tow. The router or the router can build it dynamically through some routing
protocols that ex dynamically through some dynamic routing protocols such as the Routing Information Protocol, Our I P or open Shorter's tests
First protocol, which is, oh, SPF and other protocols that can act dynamically to build the routing table. Inside that out.
What are the main advantages off a wireless network? Many advantages off wireless flexibility, mobility, scalability
and other advantages for the wireless network over the wild. But let's remember here that the network can be composed off mixer technologies, wired and wireless wireless to offer flexibility, mobility and scalability and wire to connect this world. Liss network. Tow the wired infrastructure,
in which layer does the weap work? The Web is the wireless excess point. It works in layer tow the Datalink lair.
It works in both layers, the physical and the detailing. But it is a layer to device What are the main throwbacks of wireless networks? We had
some drawbacks its limitations in the coverage area. Do tow the obstacles off walls or
weather conditions, or sometimes the long distances that can at anyway, the signal being transmitted.
The sniffing, its security vulnerability in the world is not what it allows. Four. Sniffing off the data being sent from the sender to the receiver because that transmission media is open for everyone, it is simply the air that can be
sniffed by anyone, and the message that is intended to a certain recipient can be interpreted and
received by another recipient that was not intended. This is off course, a security hole or a vulnerability.
Ah, the wireless networks in general have higher beat a retreat than the wild ones.
And by this we come to the end off our wireless section. Hopefully, we have briefed many off the wireless concepts. Thank you

Network Fundamentals

In this basic Network Fundamentals course, you will get an introduction to basic networking concepts to expand your knowledge about network security. You will get a complete overview of networks including wired and wireless computer networks, devices, and protocols.

Instructed By

Instructor Profile Image
Mohammad Adly
EC3 Manager at Information Technology Institute