Wireless Network Notes
Wireless Network Notes
Wireless Network Notes
- WLAN (Wireless Local Area Network): This is a wireless network that covers
a small area, such as a home, office, or public space like a coffee shop.
WLANs typically use Wi-Fi technology to connect devices to the network.
- WWAN (Wireless Wide Area Network): This is a wireless network that covers
a large geographic area, such as a city or even a country. WWANs use
cellular technology to connect devices to the network.
- Access points (APs): These are devices that transmit and receive wireless
signals, and they act as a bridge between wireless devices and the wired
network.
- Wireless adapters: These are devices that allow computers and other
devices to connect to a wireless network.
Wireless
Network
Diagram
4. Wi-Fi standards
ans-
Wi-Fi is a wireless networking technology that is used to connect devices to a
WLAN. Wi-Fi standards are defined by the Institute of Electrical and
Electronics Engineers (IEEE), and they specify the maximum data rate, range,
and other features of a wireless network. Some common Wi-Fi standards
include:
- 802.11a: This standard uses the 5 GHz frequency band and has a maximum
data rate of 54 Mbps.
- 802.11b: This standard uses the 2.4 GHz frequency band and has a
maximum data rate of 11 Mbps.
- 802.11g: This standard uses the 2.4 GHz frequency band and has a
maximum data rate of 54 Mbps.
- 802.11n: This standard uses both the 2.4 GHz and 5 GHz frequency bands
and has a maximum data rate of 600 Mbps.
- 802.11ac: This standard uses the 5 GHz frequency band and has a
maximum data rate of 6.9 Gbps.
1)Wireless Networking Issues
Ans -
1) Interference: When too many wireless devices are in the same area,
they can interfere with each other and cause signal problems.
APPLICATIONS -
WiMAX:
3. Base Station: The base station is the central hub of the WiMAX
network. It connects to the internet and communicates with the
transmitters and receivers to manage the flow of data between the
devices.
4. Backhaul: The backhaul is the link that connects the base station to
the internet. It can be a wired or wireless connection, and it must be fast
and reliable to support the high-speed data transfer rates of WiMAX.
6. Antenna: The antenna is used to transmit and receive signals over the
air. It can be a directional or omni-directional antenna, depending on the
needs of the network.
9) M2M Communication
Ans-
Bluetooth has three security levels: 1, 2, and 3. Each level provides a different
level of security.
3. Security level 3:
Security level 3 is designed for more sensitive applications, such as financial
transactions or confidential data transfer. It provides stronger security
features, including mutual authentication and more advanced encryption.
4. Pairing:
Bluetooth devices must be paired before they can communicate. During the
pairing process, the devices exchange a unique key that is used for encryption
and authentication.
5. Vulnerabilities:
Despite its security features, Bluetooth is not immune to vulnerabilities. Some
common vulnerabilities include unauthorized access, eavesdropping, and
man-in-the-middle attacks.
6. Best practices:
To enhance Bluetooth security, it is recommended to use the highest security
level available, keep devices up-to-date with the latest security patches, and
avoid using Bluetooth in public places where it may be more vulnerable to
attacks.
13) SPIN (Sensor Protocols for Information via Negotiation)
Ans -
SPIN (Sensor Protocols for Information via Negotiation) is a protocol suite
used in wireless sensor networks (WSNs) to enable communication between
sensors. It is designed to be energy-efficient and scalable, making it
well-suited for WSNs with large numbers of sensors that operate on limited
battery power.