1 / 17

Why go Wireless? By Cheryl Aupperle

Why go Wireless? By Cheryl Aupperle. The Start…. Wireless communication is something we all are familiar with. Think about using a walkie-talkie, listening to the radio, using a cb radio in cars or a cellular phone. Wireless Communication.

Download Presentation

Why go Wireless? By Cheryl Aupperle

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Why go Wireless? By Cheryl Aupperle

  2. The Start…. • Wireless communication is something we all are familiar with. Think about using a walkie-talkie, listening to the radio, using a cb radio in cars or a cellular phone.

  3. Wireless Communication Wireless communication as most of us know it, is voice transmission through air. This can be done with radio waves or satellite.

  4. But in the context of this presentation,those means of wireless communication is not what I would like to talk to you about today…. • What I had in mind to talk about today is wireless computing. Anyone who has ever hooked up a computer, or looked at the back side of the computer desk must have wondered what can be done about all of the cords. Wireless computer devices can be an answer to that question, and it can also neaten up your workspace.

  5. You can connect computers that are not even in the same room; they may be all over your home or office, to printers, cell phones, PDA’s, the internet and each other. Even if the connection is only across the room, you won’t be tripping over cords anymore. Computers and devices that are far apart can be connected with a wireless bridge and/or antennas.

  6. Wireless Computer Devices include…. • Mouse • Keyboard • Routers • PDAs and cell phones (depending upon the model) • Printers

  7. How do they work? • Infrared waves transfer the data from your device into your computer or to the other device. There are other devices that use radio waves to transmit the data. • Your computer must have a receiver compatible with the transmission method of your wireless device. • PC cards can make wireless devices work with your computer or PDA • USB adapters (for some computers) can turn a regular computer device into a wireless one.

  8. Infrared • Infrared devices use infrared rays like regular remote controls do. • This is the least secure data transmission. There is a high chance of data interference. • Data integrity is low. Infrared signals can occasionally be ‘dropped’. • Infrared devices require a line-of-sight transmission. • Shortest transmission range (5-20 feet).

  9. Bluetooth • Bluetooth wireless technology operates at the 2.4 Ghz radio spectrum. This is done using radios with the capability to do a spread spectrum, frequency hopping, and full-duplex signal at up to 1600 hops/sec. Up to seven simultaneous connections can be made by the signal hopping among 79 frequencies at 1 MHz intervals to give a relatively low chance of signal interference. • The range is about 30 feet.

  10. RF • RF works by having a 2 – way wireless digital communication signal between the devices. The 2 – way digital communication allows the devices to “talk” to each other so that no data is lost in transmission. • It has a greater range than the other 2 methods. (50 – 100 feet). With the extender, you can get a range of about 500 feet.

  11. So what’s the catch? • It is more expensive than wired devices. • Well, some experts question the security of data transmitted wirelessly. Since the signal travels openly through the air, anyone with the proper software can “read” the data.

  12. What can be done about this? • You can encrypt your data • Go back to having a wired connection • Buy your wireless devices from a company that guarantees the security of the data transmission • Look for wireless devices that use WPA, have a built in firewall, or allow you to limit the range of data transmission

  13. Encryption • Select IBM ThinkPads automatically encrypt data and uses the IBM Embedded Security Subsystem when it is used to send data over a wireless connection. IBM has developed other ThinkPads with Cisco Systems Aironet that give you even more security options. • WPA (wireless protected access) standard as opposed to WEP (wired equivalent privacy). WPA uses a new method for automatic encrypting keys. It also automatically checks wirelessly transmitted data, this helps prevent any hackers from changing packets. A new Microsoft code with WPA that authenticates users and allows protection against users joining rouge wireless networks.

  14. Built – in firewalls • The Apple Airport Extreme has a built – in firewall and also allows users to limit the range of data transmission. • When you buy a router, check to see if it has a built – in firewall. Limiting transmission range • Check each device to see if you can limit the range of data transmission

  15. Conclusion • Infrared: Least secure and shortest range, cheapest, on it’s way out, most new devices are not made to transmit infrared, compatible with virtually all computers and OS. • Bluetooth: Most popular, average security and range, the SIG is constantly working to improve Bluetooth, most new devices are made to transmit Bluetooth, compatible with any computer and OS that supports Bluetooth.

  16. Conclusion Continued • RF: Largest range, best data integrity, and better security, only made by Wireless Computing, most expensive, compatible with several computers and OS • All wireless technology is the ‘cutting edge’. In the future, wired devices may stop being made altogether. • There is no right or wrong wireless computer device choice, you have to decide which type suits your needs.

  17. Sources 1) Apple Computers. 5 April 2003. <http://www.apple.com/airport>. 2) Apple Computers and Bluetooth. 5 April 2003. <http://www.apple.com/bluetooth>. 3) Wireless Computing. 9 April 2003. <http://www.wireless-computing.com>. 4) International Business Machines. 9 April 2003. <http://www.pc.ibm.com/us/accessories/>. 5) Bluetooth. 9 April 2003. <http://www.bluetooth.com>.   6) Dell Computers. 10 April 2003. <http://www.dell.com>. 7) Rupley, Sebastian. “A New Spin On Wireless LAN Security.” PC Magazine. 10 April 2003. <http://www.pcmag.com/article2/0,4149,993682,00.asp>

More Related