Login with Facebook

What is Wi-Fi and how does it works

WiFi comes from 'Wireless Fidelity’ that is a wireless data transmission technology used for the Internet - mainly - and based on the 802.11 standards. But what is it in reality, and how does it work? In most cases, it is used in the home environment, for the connection of devices in a local network, but it is not the only practical application possible, and the details about its operation are much more complex.


Whenever possible, it is most convenient to connect by cable. It is the greatest guarantee of speed and stability; however, there are cases in which only the WiFi connection is possible. And its advantage is precisely there, in that the WiFi can arrive where the wired connection does not arrive, as it happens with mobile networks about the fiber-optic broadband infrastructure. Also, in terms of installation cost, it is also cheaper than a wired network.


How does WiFi connectivity work?


The WiFi is based on radio waves, exactly like the radio itself, mobile telephony or television. However, the frequencies used for this wireless connectivity technology are different, specifically 2.4 GHz up to the 802.11n and 5 GHz standard in 802.11 ac. Currently, although the 5 GHz provide superior performance, both frequencies are used and, in addition, in the higher performance equipment, the data transfer is combined by both bands.


The two components of WiFi


In a WiFi connection, we have a wireless adapter in a computer - or other devices - that translates the data in the form of a radio signal and, through an antenna, transmits them ’over the air’ and a router which is responsible for receiving the signal and decode it. And once this is done, by a physical connection, by cable, through Ethernet, it sends the information through the Internet to other servers.


Obviously, this whole process happens exactly the same, but vice versa, when it is the ’customer’ who has to receive information from the Internet. The wireless router receives data that translates into a radio signal and sends it to the wireless adapter. All this can happen in 2.4 or 5 GHz, as we mentioned earlier, and over 802.11 a / b / g / n / ac standards. There is backward compatibility between adapter standards and access points, and in the latest specifications, it can be transmitted simultaneously in two bands for faster data transfer speed.


What is a WiFi hotspot?


An access point is an area with wireless connectivity through this technology. The router is a WiFi hotspot, for example, as long as it has this technology, and public networks in coffee shops, airports, and other working places are too. However, a wide variety of wireless network adapters can share WiFi if they are connected to another network that allows them to access the Internet. In fact, smartphones can take advantage of wireless connectivity with mobile networks and, therefore, we can share WiFi with Android and iPhone.


Types of security in WiFi connections

The security of WiFi is variable, mainly based on the encryption that applies to communications between the router and wireless adapters. There are several options, and they can be divided between safe and unsafe by their technical characteristics:


An open WiFi, without a password, does not apply encryption in communications and has no access password. This is the most insecure option, while anyone can connect to the router and intercept their communications with the devices connected to it. Therefore, it is relatively simple to spy on any user. But QEP encryption is also insecure, which is the most basic. It is weak encryption and with demonstrated vulnerabilities that allow obtaining the encryption key in just a few minutes.


The WPA encryption, which is considered safe, although it is not one hundred percent secure. WPA2 encryption is also considered secure which is an evolution of the previous one, and not only improves security but also introduces performance-related improvements in information exchanges. These two options, as we mentioned earlier, are those that are considered safe today.


Basic Requirements:


A mobile device, such as a laptop, must have a card or a wireless adapter, to take advantage of Wi-Fi technology. The latest laptops have built-in wireless cards; however, in older models, you can use a wireless adapter to connect it to a USB port or a wireless card that connects to a PCI card slot. Printers and desktops that do not have wireless cards can also use USB wireless adapters to connect to the USB ports (universal serial bus). A desktop computer also has a PCI slot where a wireless card can be connected.


A wireless router acts as a gateway to the main access point. This wireless router connects to a wired Ethernet network that provides the Internet connection; therefore, the router must have a port to connect to a cable or DSL modem.


Configure the wireless router with the basic or default settings required. An SSID (service set identifier) ​​is the name of the network. This has a default configuration with the name of the manufacturer. You can keep that name or you can change it to whatever you want. You must also configure the router with the channel which, by default, is channel 6.


You can change this setting to avoid interference if you live in a multi-dwelling construction. Also, you may have to configure the router security option. You can use the standard connection settings or the one that is publicly available. However, this entails the possibility of receiving a cyber-attack or an intrusion through the network. Therefore, it is recommended that you use a password and username to protect your wireless network.


Interactive zones:

The mobile computing industry is becoming more popular every day. Thanks to the public Wi-Fi interactive zones that people can use. When you turn on your computer or other devices that have Wi-Fi enabled, they will show available network connections. You can choose the one that has the strongest signal and connect. Often, in a public interactive zone, you can connect directly without using a password. However, some interactive zones require the user to enter a password to connect. Usually, this happens when the service is paid.

 

No need to install, cables and software. You just turned it onWi-Fi, enter the password printed on the device and connect the devices at the same time!


Comments




Send Comment

Need a custom
essay?

We will write it for you.
Order now

Free Essay Examples

Free essays:

All you need to know about the ACA Code of ethics
Architecture and Democracy: An Introduction
Architecture and Democracy: Democratic Values
Architecture and Democracy: Democratic Procedures
All You Need to Know About a Synthesis Essay
An essential guide to understanding Film Theory
Application of Artificial Intelligence in Cyber Security
Applications of electrical engineering
Augmented reality: what it is, how it works, examples
Advantages And Disadvantages Of Social Networking
All you need to know about Cryptography
Applications of astrophysical science
All you need to know about architecture engineering
Applications of geological engineering
Artificial intelligence and medicine: an increasingly close relationship
An insight into Computational Biology
ACA code of conduct
A Rose for Emily
Applications of Mathematics in daily life
Architecture mistakes to avoid
All you need to know about Toxicology
All you need to know about Holistic Medicine
All you need to know about linguistics
An introduction to Linguistics and its subfields
All you need to know about Anxiety disorder
All you need to know about Drones
A Brief Insight into Political Science
Assumptions related to feminism
Biomedical engineering trends to look out for
Bionic Limbs and Technology: Advancements Improving Patients' Lives
Bipolar disorder: Symptoms, causes, diagnosis and treatment
Biochemistry of neurotransmitter
Brain-Computer Interface systems with EEG signals
Consequences of racial discrimination in urban housing development
Cryptocurrency: Advantages and Disadvantages
Character Archetypes: The Good
Character Archetypes: The Bad
Contemporary art trends
Commonly Confused Words
Commonly Confused Words: Part 2
Data Visualization: What it is and why it matters?
Data Science: Fundamental tools for data analysis
Different forms of dance you should know about
Digital Imaging: What Is It?
Dynamic Systems Modeling with Machine Learning
Eat To Live or Live To Eat
Everything you need to know about WiMAX
Everything you need to know about Data Science
Everything you need to know about Virtual memory
Entrepreneur trends to know about
Film styles and the types of styles for shooting a film
Famous African American literature authors
How to Write a Personal Essay
Housing Needs in America
How to Write a Description Essay
How to Create an Excellent Scholarship Essay?
How to write a cause and effect essay
How to Hire the Best Essay Writing Service Provider?
How to Write a College Application Essay?
How to get the most out of your English lectures
How to write Expository Essay
How to succeed in your psychology class?
How to Write an Academic Essay in the Shortest Time?
History of Journalism
How Different Sectors are Using Artificial intelligence (AI)
How to write an informative essay
How to deliver persuasive essays?
How to Give a Convincing Presentation
How to write an essay on leadership?
Historical Art Still Around Today
Humanoid robot: what it is, how it works and price
History of Chemistry
Healthcare Advanced Computer Power: Robotics, Medical Imaging, and More
Healthcare AI: Game Changers for Medical Decision-Making and Remote Patient Monitoring
How to understand different types of English
How to Cope with Chronic Pain
How African American choreographers and dancers have influenced American dance
How mobile robot can do in logistics or in production
How To Become a Successful Entrepreneur
History of the Philosophy of Feminism
Introduction to Urban Studies
Importance of dance in education
InMoov: how to build an open source humanoid robot
Importance of KYC verification to making the Blockchain secure
Importance of Rhythm
Importance of dance student evaluation
I/O control methods -types and explanations
Identity theft: what to do?
Know about the history of science
Know about the different forms of traditional African dances
Latest dance trends
Latest technology trends
Modern sociology trends you should know about
Modern Art that the Past Would Have Scorned
Modern Art that the Past Would Have Scorned, Part 2
Memory Management in an Operating System
Misconceptions About the Word “Introvert”
Major healthcare trends
Nuclear fusion: What it is and how it works?
Neural networks: what they are and what they are for
Robotic Integration into Our Lives: Now and the Future
Role of a neuroscientist
Risk management, meaning, and importance for companies
Role of gender studies
Role of a digital artist
Should You Start a Career Or Enter University At 18?
Smoking Should Be Banned
Should You Go Digital?
Standard finance terms to know about
Social robots
Schizophrenia - a rare psychiatric illness | Essay
The Looming Energy Crisis in America
Top benefits of performance-based engineering
The More Languages You Know, The More Times You Are a Man
Things to consider while writing an Argumentative Essay
Top Ways to Improve Your Academic Writing Skills
Tips to Excel in Creative Writing
The origins of films in the early 19th century
Top career options in Architecture
The Elevator Pitch
Top finance trends 2020
The basic Structure and functionality of robots
The Way to Success
The election system of the President in the United States of America
Two-party System in United States of America
Top trends in urban design
The history and theory of African American filmmaking
Top benefits of creative writing
Tinnitus Guide: Common Symptoms and Treatment Options
The language of dance
The digital image processing management
Top famous politicians of the World
Top methods of political science!
The history of the feminist movement
Understanding the sociology of Race & Ethnicity
Urban planning in the US
Virtual reality, what it is and how it works
Various theoretical perspectives of sociology
What is a Definition Essay?
What are diagnostic essays?
What is the relation between art structural engineering?
What is a Narrative Essay
What are robotics and intelligence systems?
What are the benefits of studying health sciences?
What is artificial intelligence and why it matters?
What is comparative Literature?
Why study neuroscience
What is Wi-Fi and how does it works
What is French history famous for?
What are Humanistic Studies?
What is covered in Biophysics?
What is modern journalism?
What is Virtualization? Benefits & Applications
What are modern public relations?
What is plasma physics?
What is teacher preparation?
What is rapid prototyping for 3D printing?
What is contemporary European Politics?
Why should you learn American Ballet?
What is engineering physics?
What is the purpose of African American Literature?
Ways to learn the Rhythm
What is digital art used for?
What are Enzymes and how do they work
Who is the father of political science?
Why Study Political Science - Job?
What is the Philosophy of Feminism?
What is a quantum computer?
Ways B2B Startups Streamline Their Conversion Strategies
Why do biomedical signals need processing?
4 Facts about Origin of Mathematics!