You are on page 1of 7

WiMAX

WiMAX is an acronym for Worldwide Interoperability for Microwave Access. Also known as IEEE 802.16, it is a communications standard that is intended for wireless "metropolitan area networks". WiMAX can provide broadband wireless access (BWA) up to 30 miles (50 km) for fixed stations, and 3 - 10 miles (5 - 15 km) for mobile stations. In contrast, the Wi-Fi/802.11 wireless local area network standard is limited in most cases to only 100 - 300 feet (30 - 100m).WiMAX is a part of a fourth generation or 4G, of wireless-communication technology.

The name WiMAX was created by the WiMAX Forum which was formed in June 2011 to promote interoperability of the standard. WiMAX offers data-transfer rates that can be superior to conventional DSL connections, however, the bandwidth must be shared among multiple users and thus yields lower speeds in practice.

How Does It Work? WiMAX operates similar to Wi-Fi but at higher speeds, over greater distances and for a greater number of users. A WiMAX system consists of two parts: A WiMAX Tower: A single WiMAX tower can provide coverage to a very large area -- as big as 3,000 square miles (~8,000 square km). A WiMAX Receiver: The receiver and antenna could be a small box or PCMCIA (Personal Computer Memory Card International Association) card, or they could be built into a laptop the way WiFi signals are accessed.

A WiMAX tower station connects directly to the Internet using a high-bandwidth, wired connection. It can also connect to another WiMAX tower using a line-ofsight, microwave link. This connection to a second tower (often referred to as

a backhaul), along with the ability of a single tower to cover up to 3,000 square miles, is what allows WiMAX to provide coverage to remote rural areas.

WiMAX actually can provide two forms of wireless service: There is the non-line-of-sight, WiFi sort of service, where a small antenna on your computer connects to the tower. In this mode, WiMAX uses a lower frequency range -- 2 GHz to 11 GHz (similar to WiFi). Lowerwavelength transmissions are not as easily disrupted by physical obstructions -- they are better able to diffract, or bend, around obstacles. There is line-of-sight service, where a fixed dish antenna points straight at the WiMAX tower from a rooftop or pole. The line-of-sight connection is stronger and more stable, so it's able to send a lot of data with fewer errors. Line-of-sight transmissions use higher frequencies, with ranges reaching a possible 66 GHz. At higher frequencies, there is less interference and lots more bandwidth.

WiFi
Wi-Fi is a popular technology that allows an electronic device to exchange data wirelessly (using radio waves) over a computer network including highspeed internet connections. It uses IEEE 802.11 family of standards. An electronic device which is capable of using WiFi (such as a personal computer, video game console, smartphone, tablet, or digital audio player) can connect to a network resource such as the Internet via a wireless network access point. Such an access point (also called as hotspot) has a range of about 20 meters (65 feet) indoors and a greater range outdoors. .

Wi-Fi is a trademark of the Wi-Fi Alliance.

The WiFi communication across a wireless network is a lot like two-way radio communication as: A computer's wireless adapter translates data into a radio signal and transmits it using an antenna. A wireless router receives the signal and decodes it. The router sends the information to the Internet using a physical, wired Ethernet connection. The process also works in reverse, with the router receiving information from the Internet, translating it into a radio signal and sending it to the computer's wireless adapter.

WiFi Hotspots

WiFi networks can either be "open", such that anyone can use them, or "closed", in which case a password is needed. WiFi technology uses radio for communication, typically operating at a frequency of 2.4GHz. Electronics that are "WiFi Certified" are guaranteed to interoperate with each other regardless of brand. WiFi is technology designed to cater to the lightweight computing systems of the future, which are mobile and designed to consume minimal power. PDAs, laptops, and various accessories are designed to be WiFi-compatible. There are even phones under development that would switch seamlessly from cellular networks to WiFi networks without dropping a call. More information on varied use of WiFi and WiMAX can be obtained from the following links: 1. WiFi 2. WiMAX

Wireless Security Protocols: WEP, WPA and WPA2


Various wireless security protocols have been developed to protect home wireless networks. These wireless security protocols include WEP, WPA, and WPA2, each with their own strengths and weaknesses. In addition to preventing uninvited guests from connecting to your wireless network, wireless security protocols encrypt your private data as it is being transmitted over the airwaves. Wireless networks are inherently insecure.

Although many of these issues have since been addressed, wireless networks are generally not as secure as wired networks. Wired networks, at their most basic level, send data between two points, A and B, which are connected by a network cable. Wireless networks, on the other hand, broadcast data in every direction to every device that happens to be listening, within a limited range. Following are descriptions of the WEP, WPA, and WPA2 wireless security protocols: Wired Equivalent Privacy (WEP): This was the original encryption protocol developed for wireless networks. As its name implies, WEP was designed to provide the same level of security as wired networks. However, WEP has many well-known security flaws, is difficult to configure, and is easily broken. Wi-Fi Protected Access (WPA): It was introduced as a security update over WEP. Most current WPA implementations use a preshared key (PSK), commonly referred to as WPA Personal, and the Temporal Key Integrity Protocol (TKIP, pronounced tee-kip) for encryption. WPA Enterprise uses an authentication server to generate keys or certificates. Wi-Fi Protected Access version 2 (WPA2): This was the most significant enhancement over WPA. It uses the Advanced Encryption Standard (AES) for encryption. The security provided by AES is sufficient and top secret.

How Safe Is Your Wireless Network


Almost all folks nowadays use wireless networks as a medium to connect to the internet or to the peers over a small area as compared to the wired form. Though regarded now as safe with the advent of new encryption standard as AES and WPA v2 protocols, yet these are still the soft target for most of the hackers. The following points question the safety of your router or access point:

1.Did you change the default administrator password and username? Any Wi-Fi home networks has a router at its core, the interface of which can be easily accessed by typing in the default gateway at the address bar of the browser .However, for any given piece of routing equipment, the logins provided are simple and very well-known to hackers on the Internet. Change these settings immediately. 2. Did you change the default SSID (Service Set Identifier)? Access points and routers all use a network name called the SSID. Manufacturers normally ship their products with the same SSID set. For example, the SSID for Linksys devices is normally "linksys." True, knowing the SSID does not by itself allow your neighbors to break into your network, but it is a start. Change the default SSID immediately when configuring wireless security on your network. 3. Did you disable SSID broadcast? In Wi-Fi networking, the wireless access point or router typically broadcasts the network name (SSID) over the air at regular intervals. Disabling this drastically reduces the chance of your router being compromised by unauthorized personnel. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may roam in and out of range. Fortunately, most Wi-Fi access points allow the SSID broadcast feature to be disabled by the network administrator. 4. Have you Auto-Connected to Open Wi-Fi Networks ever? Connecting to an open Wi-Fi network such as a free wireless hotspot or your neighbor's router exposes your computer to security risks. Although not normally

enabled, most computers have a setting available allowing these connections to happen automatically without notifying you (the user). This setting should not be enabled except in temporary situations. 5. Did you assign Static IP Addresses to devices? Most home networkers gravitate toward using dynamic IP addresses. DHCP technology is indeed easy to set up. Unfortunately, this convenience also works to the advantage of network attackers, who can easily obtain valid IP addresses from your network's DHCP pool. Turn off DHCP on the router or access point, set a fixed IP address range instead, and then configure each connected device to match. Use a private IP (usually purchased) address range (like 10.0.0.x) to prevent computers from being directly reached from the Internet. 6. Is your Firewall enabled? Modern network routers contain built-in firewall capability, but the option also exists to disable them. Ensure that your router's firewall is turned on. For extra protection, consider installing and running personal firewall software on each computer connected to the router. 7. Is your router physically safe? When installing a wireless home network, the position of the access point or router determines its reach. Try to position these devices near the center of the home rather than near windows to minimize leakage. 8. Do you mind turning off your router when not in use? The ultimate in wireless security measures, shutting down your network will most certainly prevent outside hackers from breaking in! While impractical to turn off and on the devices frequently, at least consider doing so during travel or extended periods offline.

You might also like