Wireless networking components
A wireless network consists of a wireless access point and wireless networking equipment and wireless networking routers.
i. An access point allows connectivity between the wireless client or wireless device and the wired network. The access point translates wireless data packets to standard Ethernet data frames and transmits them across the wired network. It connects to existing Internet connections and allows numerous devices to communicate with each other.
ii. Wireless networking equipment consists of wireless hubs, cards switches and routers. These components interface with computers, printers, or other wired devices using an Ethernet connection. Most computers come fitted with Ethernet adapters and only require to be connected to a cable, dial-up or DSL modem. A wired PC can be connected to a modem using a wireless switch or wireless hub as an alternative, to form a wireless network.
iii. Wireless networking routers function as a gateway that links an Internet connection, for instance a cable modem, to a wireless network. Broadband routers consist of an access point and a switch, typically made up of four Ethernet ports to enable more devices to be connected to the network. Broadband wireless routers comprise built-in dynamic host configuration protocol (DHCP) servers. These servers automatically assign an IP address to each device that is connected to the router.
Wireless networking standards
The IEEE 802.11b standard is the family of specifications created by the Institute of Electrical and Electronics Engineers Inc. for wireless Ethernet local area networks in 2.4 GHz bandwidth range. It was intended as a way to connect computers and other devices to each other and to the internet at very high speed without any complicated wiring and at a modest price.
A next generation wireless standard, 802.11g, has recently been approved. It will work with older wireless networking technology and allow companies and users to keep existing equipment and possibly boost the number of wireless connections in homes and in businesses. The 802.11g standard promises data transfer rates of up to 54 Mbps, compared with 11 Mbps on the current 802.11b standard.
The 802.11g standard is compatible with 802.11b (Wi-Fi) because the two standards both run in the frequency spectrum of 2.4 Gbps. Another standard, the 802.11a, is used in accessing hubs and computer cards, but it operates at a higher frequency and is not compatible with the 802.11b standard.
How the internet works
The Internet is a massive interconnection of networks. It links millions of personal, governmental and business computers together globally, creating a network wherein computers can communicate with each other provided they are connected to the Internet. All computers connected to the internet can be categorized as servers and browsers.
i. Servers: Most of the information on the internet resides in servers. These specialized computers perform the function of storing information, sharing information with other servers, and making this information accessible to the public.
ii. Browsers: These are used to access the World Wide Web from any computer. Some examples of browsers that are commonly used include; Netscape Navigator, Microsoft Internet Explorer and Firefox.
When a user connects his or her computer to the internet, the computer connects to a special kind of server provided and managed by an Internet Service Provider (ISP). The "ISP Server" provides the connection between the user’s browser and the internet. One ISP server manages the internet connections of numerous browsers; thousands of users can connect to the same server simultaneously. Browsers send requests to ISP servers to view web pages, check emails, and so forth. ISP servers have to link with other internet servers since they cannot hold all the information contained in the internet. Another common type of server is the "Host Server". Websites ‘reside’ in these types of servers. Every website that exists is located on a host server, which stores information and makes it accessible to other servers.
Figure 1: Home computers connected to servers
In order for a user to view a web page from his or her browser, the following process occurs:
1. The user types an address (URL) into his/her ‘address bar’ or clicks on a hyperlink.
2. The user’s browser sends a request to his/her ISP server requesting the page.
3. The user‘s ISP server checks in a large database of internet addresses and gets the correct host server in which the requested website ‘resides’. It then sends a request to that host server asking for the page.
4. The host server sends the page that has been requested to the user‘s ISP server.
5. The user’s ISP sends the page to his/her browser and he/she sees it displayed on his/her computer screen.
Virtual private networks
A virtual private network (VPN) is a computer network wherein some of the connections between computers/devices are carried by open links or virtual circuits in larger network (such as the Internet) rather than by physical wires. A VPN uses public telecommunication infrastructure to enable traveling users or remote office users to access a central organizational network. Typically, remote user of virtual private networks need to be authenticated, and habitually secure data using encryption technologies to ensure that private information is not disclosed to unauthorized parties.
VPNs can perform any network function, for instance it can share data and provide access to network resources, databases, printers, websites, and so on. VPN users generally experience the central network just as if they were directly connected to it. Virtual private network technology through the public Internet has eliminated the need for dedicated leased-line telecommunication circuits that are often costly.
Conclusion
Wireless technology enables setting up or augmentation of networks without installing wires. Presently, almost every computing device, including mice, keyboards, printers, monitors, desktops, workstations, notebooks and tablets can be integrated wirelessly. Wireless technologies offer cost advantages, convenience and productivity over the traditional wired networks. Organizations worldwide use wireless technologies in solving business problems and creating advantages over their competitors. Wireless technologies are enabling both mobile and remote workers to access business applications and information from more places. Users find wireless networks more flexible in configuring an office, and essential in improving both the collaboration of workers and productivity. These technologies help users create added value for their clients and a cutting edge over their competitors.
References
Collins, T., Keeley, R., & Waye, D. (2000, October). virtual private network (VPN). Retrieved November 23, 2011, from searchenterprisewan: http://searchenterprisewan.techtarget.com/definition/virtual-private-network
Groth, D., & Skandier, T. (2005). Network plus study guide (2, illustrated ed.). New York, USA: John Wiley and Sons.
Karris, S. (2009). Networks: Design and Management (illustrated ed.). Newton Abbot, UK: Orchard Publications.
Marcus, S. J. (1999). Designing wide area networks and internetworks: a practical guide (illustrated ed.). Massachusetts, USA: Addison-Wesley Professional.