III. Wireless Network Architectures
A. Infrastructure Mode vs. Ad-hoc Mode |
Between devices \Through an access point |
slower\faster |
Range restricted to individual device range\Range determined by access points |
B. Mesh Networks: Enhancing Connectivity |
provide better coverage, faster speeds, and easy setup. |
C. Cellular Networks and their Evolution |
1G, 2G ,3G ,4G, 5G |
|
|
IV. Wireless Standards and Protocols
A. IEEE 802.11 (Wi-Fi) |
Is a standard that governs wireless communication in local area, allowing devices to connect and exchange data . |
WEP, WPA, WPA2, and WPA3 are crucial for securing Wi-Fi networks |
B. Bluetooth and its Applications |
Mobile Phone Connectivity, Wireless Speaker , File Transfer |
C. 5G Technology |
Benefits: Faster data transmission, real-time interactions, improved connectivity. |
|
|
V. Security in Wireless Networks
A. Types of Risks |
Piggybacking , Wardriving, Evil Twin Attacks, Wireless Sniffing, Unauthorized Computer Access, Shoulder Surfing, Theft of Mobile Devices |
B. Types of minimize Risks |
Change Default Passwords , Restrict Access , Connect via VPN Check Security Options, Update Access Point Software, Use File Sharing Cautiously, Install Firewall, Change Default Passwords, Encrypt Data, Maintain Antivirus Software, Protect SSID, |
|
|
VI. Emerging Trends in Wireless Technology
A. Wireless Connectivity in IoT |
The impact of the wireless in IOT on our lives: |
Increased Efficiency , Enhanced Convenience , Enhanced Convenience , Personalized Experiences |
B. Edge Computing |
dge computing in wireless networks represents a paradigm shift in how data is processed and services are delivered, bringing efficiency, speed, and new capabilities to various fields. |
C. Artificial Intelligence |
it helps in addressing issues with Wi-Fi radios, client connectivity, and potential security threats. |
|