COMPUTER SCIENCE CAFÉ
  • WORKBOOKS
  • BLOCKY GAMES
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY
  • WORKBOOKS
  • BLOCKY GAMES
  • GCSE
    • CAMBRIDGE GCSE
  • IB
  • A LEVEL
  • LEARN TO CODE
  • ROBOTICS ENGINEERING
  • MORE
    • CLASS PROJECTS
    • Classroom Discussions
    • Useful Links
    • SUBSCRIBE
    • ABOUT US
    • CONTACT US
    • PRIVACY POLICY

NETWORKS | WIRELESS NETWORKING

ON THIS PAGE
SECTION 1 | ADVANTAGES AND DISADVANTAGES
SECTION 2 | UNGUIDED MEDIUM
SECTION 3 | WIRELESS: HARDWARE AND SOFTWARE
SECTION 4 | WIRELESS NETWORK SECURITY
ALSO IN THIS TOPIC
NETWORK FUNDAMENTALS
DATA TRANSMISSION
YOU ARE HERE | WIRELESS NETWORKING
TOPIC 3 REVISION
KEY TERMINOLOGY
​NETWORK FUNDAMENTALS ANSWERS

Picture
SECTION 1 | ADVANTAGES AND DISADVANTAGES OF WIRELESS NETWORKING
Wireless networks are becoming increasingly popular in both home and business settings. Like any technology, wireless networks have their own set of advantages and disadvantages. Here are some of the key advantages and disadvantages of wireless networks:

ADVANTAGES
  • Mobility: One of the biggest advantages of wireless networks is that they provide greater mobility and flexibility than wired networks. Users can connect to the network from anywhere within the range of the wireless signal, making it easy to move around and access network resources.
  • Cost: Wireless networks can be less expensive to install and maintain than wired networks, as they do not require the installation of physical cables or other hardware.
  • Convenience: Wireless networks are more convenient to use than wired networks, as users can connect to the network without the need for physical cables or connectors.
  • Scalability: Wireless networks can be easily expanded and scaled to meet the changing needs of a business or organization.
  • Accessibility: Wireless networks can provide greater accessibility to network resources for individuals with disabilities or mobility issues.

DISADVANTAGES
  • Security: Wireless networks can be less secure than wired networks, as the wireless signals can be intercepted and accessed by unauthorized users. This makes it essential to implement security measures such as encryption and authentication to protect the network.
  • Interference: Wireless signals can be subject to interference from other devices or networks, which can impact the performance and reliability of the network.
  • Range: Wireless networks have a limited range, which means that they may not be suitable for larger buildings or areas where multiple access points are required.
  • Speed: Wireless networks may not provide the same speed and performance as wired networks, particularly for data-intensive applications such as video streaming or large file transfers.
  • Compatibility: Wireless networks may not be compatible with all devices or applications, which can limit their usefulness in certain situations.

Wireless networks provide many benefits, including mobility, convenience, and scalability. However, they also have some disadvantages, such as security concerns, range limitations, and potential performance issues. By carefully considering the advantages and disadvantages of wireless networks, businesses and organizations can determine whether a wireless network is right for their needs and implement appropriate measures to ensure the network is secure, reliable, and efficient.
SECTION 2 | UNGUIDED MEDIUM
Whilst cabled connections are known as guided medium because the send the data to the exact user that it needs to be delivered too, wireless medium is known as unguided because it simply sends out the signal with no focus to the direction it should be travelling, providing use is in range of the send signal the user will receive the data.
Wireless data is mainly transmitted in three different bands of radio frequency or via optical medium.
Radio transmission is often divided into the following three categories:
  • Radio – 3KHz – 3GHz
  • Microwave – 3 – 300 GHz
  • Infrared – 300 GHz – 400Thz
As the frequency of the transmission increases the properties of the signal changes, there are advantages and disadvantages for each frequency. For example, an infrared signal does not easily pass through walls, this makes it perfect for use within the home as the data will not travel to your next door neighbour and affect their home devices, when you change the channel on your TV, luckily it does not chance on your neighbour’s TV also.

The frequency the public is allowed to use is very strictly regulated, it cannot interfere with frequencies allocated to other tasks and it cannot be transmitted at a frequency that is damaging to life. Microwave Signal is at the top end of acceptable transmittable frequency in a band known as UHF or Ultra High Frequency to EHF Extremely High Frequency.

​
Wireless technologies can also interfere with each other and produce crosstalk​, using various frequencies can help minimise this.

Some wireless technologies include:
  • Satellite use radio signal also and the frequencies they used are very mixed depending on the purpose of the satellite.
  • Wifi has a reasonably high frequency and has a moderate ability to penetrate walls and the signal will travel around 100m before deterioration depending on the environment. These features make Wifi a good solution for signal distribution in the home or in offices and work places.
  • WiMax good ability to penetrate walls and the signal will travel around 30km before deterioration depending on the environment. Speeds of around 70Mbps.
  • Lifi (Light Fidelity) uses LED lights within a building to distribute the signal. LiFi is very high speed and can transfer data at around 200Gbps. A photodetector is needed to receive the light signal, the light is transmitted by dimming and dipping the light at a range undetectable by humans, the receiver picks up the transmitted light and the change in signal is converted back to binary data representation. Lifi signals cannot pass through walls, plus the lights need to be on at all times Lifi is being used.
  • Bluetooth is used for short range data transmission and works on a frequency of around 2.5 GHz. Because Bluetooth can be found in many different technologies such as speaker systems and data devices such as heart rate monitors it have become a good medium to pair your device and transfer data. Bluetooth is normally less demanding on the device battery than Wifi but when left on when not needed it can significantly drain your battery.
SECTION 3 | WIRELESS: HARDWARE AND SOFTWARE
A wireless network consists of both hardware and software components that work together to provide wireless connectivity and access to network resources. Here are some of the key components of a wireless network:

HARDWARE COMPONENTS
  • Wireless Access Points (WAPs): These are the devices that provide wireless connectivity to devices on the network. They act as the interface between the wired network and wireless devices and transmit data over radio waves.
  • Network Interface Cards (NICs): These are the hardware components that enable devices to connect to the wireless network. NICs are typically built into laptops, tablets, and smartphones, but may need to be added as an additional component for desktop computers.
  • Routers: Routers connect multiple networks together and direct traffic between them. In a wireless network, the router acts as the gateway between the wireless and wired network.
  • Switches: Switches are used to connect devices on the network together and direct traffic between them. In a wireless network, switches are used to connect the access points to the wired network.

SOFTWARE COMPONTENTS
  • Operating System (OS): The OS is the software that runs on devices and provides the interface between the hardware and software components. The OS on devices must be compatible with the wireless network and provide support for wireless network connectivity.
  • Network protocols: Network protocols are the rules and standards that govern how data is transmitted over the network. For a wireless network, protocols such as Wi-Fi, Bluetooth, and Zigbee are commonly used.
  • Wireless Network Management Software: This software is used to manage and monitor the wireless network, including the configuration of access points, security settings, and user access.
  • Network Security Software: This software is used to protect the wireless network from unauthorized access, viruses, and other security threats. Examples of network security software include firewalls, antivirus software, and intrusion detection systems.

A wireless network consists of hardware and software components that work together to provide wireless connectivity and access to network resources. By carefully selecting and configuring these components, businesses and organizations can create a secure, reliable, and efficient wireless network that meets their needs and supports their operations.
SECTION 4 | WIRELESS NETWORK SECURITY
Wireless data transfer can be vulnerable to security threats, as the signals are transmitted over the air and can be intercepted by unauthorized users. To ensure the security of wireless networks, a variety of methods can be used to protect the network and its users. Here are some of the different methods of network security for wireless data transfer:
  • Encryption: Encryption is a technique used to protect data by encoding it so that it can only be read by authorized users. In a wireless network, encryption can be used to protect the wireless signals from being intercepted by unauthorized users. There are several encryption methods available, such as Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA), and WPA2.
  • Authentication: Authentication is the process of verifying the identity of users who access the wireless network. Authentication can be done using various methods, such as passwords, digital certificates, and biometric authentication.
  • Access Control: Access control is the process of limiting access to the network and its resources to authorized users. Access control mechanisms can be used to prevent unauthorized users from accessing the network, such as using MAC address filtering, network segmentation, and virtual private networks (VPNs).
  • Firewall: A firewall is a security device that monitors and controls network traffic between the network and the internet. Firewalls can be used to block unauthorized access to the network, prevent malware and virus attacks, and protect sensitive data.
  • Intrusion Detection and Prevention Systems: Intrusion detection and prevention systems are used to monitor network traffic and identify potential security threats. These systems can be used to prevent attacks by blocking suspicious traffic, such as Denial of Service (DoS) attacks.
  • Network Monitoring and Management: Network monitoring and management tools can be used to identify and respond to security threats in real-time. These tools can provide alerts, reporting, and analysis of network activity to help network administrators identify and respond to security threats.

A variety of methods can be used to protect wireless networks from security threats, including encryption, authentication, access control, firewalls, intrusion detection and prevention systems, and network monitoring and management tools. By implementing appropriate security measures, businesses and organizations can ensure that their wireless networks are secure, reliable, and efficient. Each method of security comes with its advantages and disadvantages:

ENCRYPTION ADVANTAGES
  • Provides a high level of security by encoding the data so that it can only be read by authorized users
  • Supports various encryption methods such as WEP, WPA, and WPA2
  • Easy to implement on most wireless networks

ENCRYPTION DISADVANTAGES
  • Older encryption methods such as WEP are vulnerable to attacks and should not be used
  • Encryption can increase the processing overhead and reduce network performance
  • Keys and passwords must be managed and updated regularly to ensure security

AUTHENTIFICATION ADVANTAGES
  • Provides a way to verify the identity of users who access the wireless network
  • Can be used in combination with encryption for added security
  • Supports various authentication methods such as passwords, digital certificates, and biometric authentication

AUTHENTIFICATION DISADVANTAGES
  • Authentication can be vulnerable to attacks such as password cracking and phishing
  • Strong authentication methods such as biometric authentication can be expensive to implement
  • Authentication methods must be managed and updated regularly to ensure security

ACCESS CONTROL ADVANTAGES
  • Provides a way to limit access to the network and its resources to authorized users
  • Can be used to prevent unauthorized access to the network, such as using MAC address filtering, network segmentation, and virtual private networks (VPNs)
  • Easy to implement on most wireless networks

ACCESS CONTROL DISADVANTAGES
  • Access control mechanisms can be vulnerable to attacks such as MAC address spoofing
  • Access control policies can be difficult to manage and update, particularly in large networks
  • Access control mechanisms can be complex to configure and troubleshoot

FIREWALL ADVANTAGES
  • Provides a way to monitor and control network traffic between the network and the internet
  • Can be used to block unauthorized access to the network, prevent malware and virus attacks, and protect sensitive data
  • Can be configured to allow or block traffic based on various criteria such as IP address, port, and protocol

FIREWALL DISADVANTAGES
  • Firewalls can be expensive to implement, particularly for large networks
  • Firewalls can increase network latency and reduce network performance
  • Firewalls must be configured and maintained carefully to ensure that they do not block legitimate traffic

INTRUSION DETECTION AND PREVENTION SYSTEMS ADVANTAGES
  • Provides a way to monitor network traffic and identify potential security threats
  • Can be used to prevent attacks by blocking suspicious traffic, such as Denial of Service (DoS) attacks
  • Can be configured to provide alerts, reporting, and analysis of network activity

INTRUSION DETECTION AND PREVENTION SYSTEMS DISADVANTAGES
  • Intrusion detection and prevention systems can be expensive to implement, particularly for large networks
  • Intrusion detection and prevention systems can increase network latency and reduce network performance
  • Intrusion detection and prevention systems must be configured and maintained carefully to avoid false positives and false negatives

NETWORK MONITORING AND MANAGEMENT ADVANTAGES
  • Provides a way to identify and respond to security threats in real-time
  • Can be used to provide alerts, reporting, and analysis of network activity
  • Can be used to optimize network performance and troubleshoot problems

NETWORK MONITORING AND MANAGEMENT DISADVANTAGES
  • Network monitoring and management tools can be expensive to implement, particularly for large networks
  • Network monitoring and management tools can increase network latency and reduce network performance
  • Network monitoring and management tools must be configured and maintained carefully to avoid false positives and false negatives
Picture
ALSO IN THIS TOPIC
NETWORK FUNDAMENTALS
DATA TRANSMISSION
WIRELESS NETWORKING
TOPIC 3 REVISION
KEY TERMINOLOGY
​NETWORK FUNDAMENTALS ANSWERS
Picture
SUGGESTIONS
We would love to hear from you
SUBSCRIBE 
To enjoy more benefits
We hope you find this site useful. If you notice any errors or would like to contribute material then please contact us.