{"id":190,"date":"2023-06-11T20:57:47","date_gmt":"2023-06-11T20:57:47","guid":{"rendered":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?page_id=190"},"modified":"2023-09-11T19:39:21","modified_gmt":"2023-09-11T19:39:21","slug":"wireless-networks","status":"publish","type":"page","link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/","title":{"rendered":"Wireless Networks"},"content":{"rendered":"<div class=\"responsive-tabs\">\n<h2 class=\"tabtitle\">WLAN<\/h2>\n<div class=\"tabcontent\">\n\n<div class=\"arconix-column-two-thirds\">\n<h3>Wireless Local Area Networks<\/h3>\n<p>Wireless local area networks are networks that perform the same function as a normal LAN, but use wireless radio signals to transmit \u00a0data instead of an ethernet cable. Wireless networks usually consist of a <strong>wireless access point<\/strong>, usually connected to a router, and a number of client devices, each equipped with a <strong>wireless network interface controller<\/strong> WNIC (Aka Wifi card).<\/p>\n<h3>Pros and Cons of Wireless Networks<\/h3>\n<p><strong>Pros<\/strong><\/p>\n<ul>\n<li>Wireless networks don&#8217;t require as many cables, so are easier to set up.<\/li>\n<li>The positioning of client devices aren&#8217;t limited by cable length.<\/li>\n<li>They are easier to use in public areas where cables would pose a safety risk.<\/li>\n<li>No limit on the number of devices that can be connected at any one time (with wired you need a spare Ethernet port on the switch)<\/li>\n<\/ul>\n<p><strong>Cons<\/strong><\/p>\n<ul>\n<li>Less secure than wired networks as you can&#8217;t control where the signal is broadcast.<\/li>\n<li>Much lower bandwidth than wired connections.<\/li>\n<li>Susceptible to electronic interference<\/li>\n<li>Limited effective range.<\/li>\n<li>Poor signal through solid walls.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<\/div>\n<div class=\"arconix-column-one-third\">\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-medium wp-image-1816\" src=\"https:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/wlan-300x300.jpg\" alt=\"wlan\" width=\"300\" height=\"300\" \/><\/p>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Wireless Encryption<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Wireless Network Encryption<\/h3>\n<p>Because wireless data is transmitted using radio signals, it is easily intercepted. This means that wireless data needs to be securely encrypted if it is to be kept secret. Over the last decade there have been a number of different wireless encryption protocols.<\/p>\n<p><strong>Wired Equivalent Privacy (WEP)<\/strong><\/p>\n<p>This was the original form of encryption used by wirless networks, however due to a security attack technique known as &#8216;packet sniffing&#8217;, the encryption technology was very easy to break.<\/p>\n<p><strong>WPA \/ WPA2<\/strong><\/p>\n<p>The weaknesses in WEP led to the development of the more secure WPA\/ WPA2 encryption technologies. These are far more secure specifications, however they can still be hacked eventually.<\/p>\n\n<\/div><h2 class=\"tabtitle\">Bluetooth<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Bluetooth Wireless Networking<\/h3>\n<p>Another wireless specification is Bluetooth. This technology is general more widely used to connect <strong>peripherals<\/strong> (such as headsets, speakers, etc) to host devices, rather than connect to general purpose networks. Bluetooth can also be used to create an<strong> &#8216;ad-hoc&#8217; network<\/strong> between two devices to allow for file sharing.<\/p>\n<p><strong>Advantages<\/strong><\/p>\n<div class=\"arconix-list\" data-arconix-icon=\"fa-chevron-circle-right\" data-arconix-color=\"black\">\n<ul>\n<li>Better for easy connection of peripherals<\/li>\n<li>Can quickly and easily create an ad-hoc network<\/li>\n<\/ul>\n<\/div>\n<p><strong>Disadvantages<\/strong><\/p>\n<div class=\"arconix-list\" data-arconix-icon=\"fa-chevron-circle-right\" data-arconix-color=\"black\">\n<ul>\n<li>Slower than wifi<\/li>\n<li>Less secure<\/li>\n<\/ul>\n<\/div>\n\n<\/div><h2 class=\"tabtitle\">Cellular Networks<\/h2>\n<div class=\"tabcontent\">\n\n<h3>Cellular Networks<\/h3>\n<p>&nbsp;<\/p>\n<p>https:\/\/www.facebook.com\/reel\/688819409381347<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Wireless Network Encryption Because wireless data is transmitted using radio signals, it is easily intercepted. This means that wireless data needs to be securely encrypted if it is to be kept secret. Over the last decade there have been a number of different wireless encryption protocols. Wired Equivalent Privacy (WEP) This was the original form&hellip;&nbsp;<a href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">Wireless Networks<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"off","neve_meta_content_width":100,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wireless Networks - Edexcel iGCSE Computer Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wireless Networks - Edexcel iGCSE Computer Science\" \/>\n<meta property=\"og:description\" content=\"Wireless Network Encryption Because wireless data is transmitted using radio signals, it is easily intercepted. This means that wireless data needs to be securely encrypted if it is to be kept secret. Over the last decade there have been a number of different wireless encryption protocols. Wired Equivalent Privacy (WEP) This was the original form&hellip;&nbsp;Read More &raquo;Wireless Networks\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\" \/>\n<meta property=\"og:site_name\" content=\"Edexcel iGCSE Computer Science\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-11T19:39:21+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/wlan-300x300.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\",\"name\":\"Wireless Networks - Edexcel iGCSE Computer Science\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\"},\"datePublished\":\"2023-06-11T20:57:47+00:00\",\"dateModified\":\"2023-09-11T19:39:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Wireless Networks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website\",\"url\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/\",\"name\":\"Edexcel iGCSE Computer Science\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wireless Networks - Edexcel iGCSE Computer Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/","og_locale":"en_GB","og_type":"article","og_title":"Wireless Networks - Edexcel iGCSE Computer Science","og_description":"Wireless Network Encryption Because wireless data is transmitted using radio signals, it is easily intercepted. This means that wireless data needs to be securely encrypted if it is to be kept secret. Over the last decade there have been a number of different wireless encryption protocols. Wired Equivalent Privacy (WEP) This was the original form&hellip;&nbsp;Read More &raquo;Wireless Networks","og_url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/","og_site_name":"Edexcel iGCSE Computer Science","article_modified_time":"2023-09-11T19:39:21+00:00","og_image":[{"url":"http:\/\/learnlearn.uk\/igcseict\/wp-content\/uploads\/sites\/3\/2016\/08\/wlan-300x300.jpg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/","name":"Wireless Networks - Edexcel iGCSE Computer Science","isPartOf":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website"},"datePublished":"2023-06-11T20:57:47+00:00","dateModified":"2023-09-11T19:39:21+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wireless-networks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/"},{"@type":"ListItem","position":2,"name":"Wireless Networks"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/#website","url":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/","name":"Edexcel iGCSE Computer Science","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"}]}},"rttpg_featured_image_url":null,"rttpg_author":{"display_name":"learnlearnadmin","author_link":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/author\/learnlearnadmin\/"},"rttpg_comment":0,"rttpg_category":null,"rttpg_excerpt":"Wireless Network Encryption Because wireless data is transmitted using radio signals, it is easily intercepted. This means that wireless data needs to be securely encrypted if it is to be kept secret. Over the last decade there have been a number of different wireless encryption protocols. Wired Equivalent Privacy (WEP) This was the original form&hellip;&nbsp;Read&hellip;","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/190"}],"collection":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/comments?post=190"}],"version-history":[{"count":3,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/190\/revisions"}],"predecessor-version":[{"id":524,"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/pages\/190\/revisions\/524"}],"wp:attachment":[{"href":"https:\/\/learnlearn.uk\/edexcel-igcse-computer-science\/wp-json\/wp\/v2\/media?parent=190"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}