Let’s talk about Wifi Router for a minute here.
Wifi basically refers to “wireless” technologies. In the olden days, devices need
to be connected via wires. A networking device that forwards data packets
between computer networks. For example, to connect a host of computers in a
particular network, they had to be connected through physical wire cables. But
making use of remote innovation, one can bring together devices and PCs
together without interfacing physical wires to one another. The router
essentially routes data packets to computers and devices connected on the
network. An internet can be distributed to the network using a router.
Router transmits the networks layer data and provides transmission of data
between LANs. The advantage of wifi is that there is no problem of wires, to
interface devices on the system, particularly when devices are in various rooms
hindered by enormous walls and doors. Its simpler and faster to make a
wireless network. Wires would consistently have more prominent restrictions
in its capacity and capacity to adjust to speeds when contrasted with wireless
9/18/2019 Buck Week 5 Discussion – IFSM 310 6381 Software and Hardware Infrastructure Concepts (2198)
image.png (9.54 KB)
Reply to Thread
|Filter by: | Clear filters
How does it work?
Wifi basically works by transmitting data using radio signals of particular
frequency. The data is picked by the devices configured to pick up such
frequency. The accepted industry standard, as to how data will be transmitted
is 802.11. This standard was accepted in 1997 by IEEE (Institue of Electrical
and Electronic Engineers) and utilized widely all over. 2.4 GHz is widely used
radio signal frequency.
Areas of concern and how to mitigate them:
One will be unauthorized use of the wifi if there is no strong password. This
concern can impact the user experience where he or she may experience
slower data access. The best way to deal with this concern is to use strong
encryption, where data is encrypted while it is on its way. WPA2-PSK is a
stronger encryption compared to older encryption method like WEP and should
be used where it deems fit.
Another way for verifying is changing password and system name on a regular
basis. Designing IP addresses physically for every device as opposed to letting
DHCP (Dynamic Host Control Protocol) allot a scope of default IP delivers to all
devices on the system