Wireless Networking: Standards, Setup, and Security

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 11

Wireless

Networking:
Standards, Setup,
and Security
Presenter (s) Name: Dylan O.
Goreseb – 230046819
Kondjee Kamutindi
220036497
Takunda Denis Chanengeta
230063438
Introduction
What is wireless networking?
 A wireless network refers to a computer network that uses radio waves instead of wires to connect devices.
This enables devices to connect to the network and to each other from anywhere within the range of the
wireless signal,.

Types of wireless networks:


 There are many different types of wireless networks, each with its own unique applications.
 WI-FI (Wireless Fidelity) networks are commonly used in homes, offices, and public spaces.
 Bluetooth networks are used to connect to short-range devices, such as speakers, etc.
 Cellular networks are commonly used to connect mobile devices to the internet and to each other.

Benefits of wireless technology:


 Users can move around freely within the range of the network with their laptops, and smartphones and get a
network connection.
2
 Not having to lay lots of cables and put them through walls etc. means less cost.
TYPES OF WIRELESS
NETWORKS:

Recap: what is a
wireless network
Overview of WLAN
Different Standards
of Wi-Fi
 The following are the Wi-Fi standards that developed from 1997 to 2008. In 1997 the IEEE
established a single standard known as 802.11.

 Each generation of wi-fi is faster and has a longer range than the previous generation. However, the actual
speed and range of a wi-fi network will also depend on other factors such as the environment and the type
of equipment used.

5
Evolution of Wi-
fi Networks
Installing and configuring Wireless Networks:
Installation essentials:
Router: The router serves as the central hub and brain of a wireless network. It is responsible for routing data traffic
between devices within the network and connecting to the Internet.
Access point: A network device that extends the range of a wireless network. It is typically used in larger homes or offices
where a single router is not enough to provide coverage to all areas.

SSID and Network configuration:


The Service Set Identifier (SSID) is the name of the wireless network. During installation, choose a unique SSID that
identifies the network.

Where to place the wireless router or WAP:


Wireless networks are susceptible to interference from other devices that use radio waves. To minimize interference, place
the wireless router away from electrical devices and keep the distance between the client and the wireless router short.

Presentation Title
Wireless Router
Implementing wireless security
1 . Change default passwords: Changing default passwords makes it harder for attackers to access a device. Most
network devices, including network access points, are pre-configured with default administrator passwords to simply
set up.
2 . Restricted access: Only allow authorized users to access your network. Each piece of hardware connected to a
network has a media access control (MAC) address. You can restrict access to your network by filtering these MAC
addresses.
3 . Protect your Service Set Identifier (SSID) : To prevent outsiders from easily accessing your network, avoid
publicizing your SSID. All Wi-Fi routers allow users to protect their device’s SSID, which makes it more difficult for
attackers to find a network. One can also change the SSID to something unique. Leaving it as the manufacturer’s
default could allow a potential attacker to identify the type of router and possibly exploit any known vulnerabilities.
4 . Install a firewall: installing a host-based firewall. Attackers who can directly tap into your wireless network may be
able to circumvent your network firewall a host-based firewall will add a layer of protection to the data on the
computer.
contin……
5 . Maintain antivirus software: Install antivirus software and keep your virus definitions up to date . Many antivirus
programs also have additional features that detect or protect against spyware or adware.
6 . Connect using a virtual private network (VPN) : VPN allows one to connect securely to their network when away
from the office. If a VPN is available to you make sure you log onto it any time you need to use a public wireless
access point.
Conclusion:
Wireless networking is a complex technology that is
constantly changing, but it is essential for many homes
and businesses today. By understanding the basics of
wireless standards, setup, and security, you can make
sure your wireless network is reliable, secure, and meets
your needs.

You might also like