Introduction to Wireless Networking Technologies



Introduction to Wireless Networking Technologies

Introduction to Wireless Networking Technologies

🔥🔥🔥SMASH👊 THAT🤜 LIKE👍 BUTTON🔥🔥🔥 and don’t forget🤦‍♀️ to 👍subscribe🔔🔥🔥🔥
https://imp.i384100.net/9WaKnY
Use above link to earn a certificate or quizzes and supplementary reading.

In today’s world, fewer and fewer devices are weighed down by physical cables in order to connect to computer networks. With so many portable computing devices in use, from laptops to tablets to smartphones, we’ve also seen the rise of wireless networking. Wireless networking, is exactly what it sounds like. A way to network without wires. By the end of this lesson, you’ll be able to describe the basics of how wireless communication works. You’ll know how to tell the difference between infrastructure networks, and ad hoc networks. You’ll be able to explain how wireless channels help wireless networks operate. And you’ll understand the basics of wireless security protocols. These are all invaluable skills as an IT support specialist, since wireless networks are becoming more and more common in the workplace. The most common specifications for how wireless networking devices should communicate, are defined by the IEEE 802.11 standards. This set of specifications, also called the 802.11 family, make up the set of technologies we call WiFi. Wireless networking devices communicate with each other through radiowaves. Different 802.11 standards generally use the same basic protocol, but might operate at different frequency bands. A frequency band is a certain section of the radio spectrum that’s been agreed upon to be used for certain communications. In North America, FM radio transmissions operate between 88 and 108 megahertz. This specific frequency band is called the FM broadcast band. WiFi networks operate on a few different frequency bands. Most commonly, the 2.4 gigahertz and 5 gigahertz bands. There are lots of 802.11 specifications including some that exist just experimentally or for testing. The most common specifications you might run into are 802.11b, 802.11a, 802.11g, 802.11n, and 802.11ac. We won’t go into detail about each one here. For now, just know that we’ve listed these in the order they were adopted. Each newer version of the 802.11 specifications has generally seen some improvement, whether it’s higher access speeds, or the ability for more devices to use the network simultaneously. In terms of our networking model, you should think of 802.11 protocols as defining how we operate at both the physical and the data link layers. An 802.11 frame has a number of fields. The first is called the frame control field. This field is 16 bits long, and contains a number of sub-fields that are used to describe how the frame itself should be processed. This includes things like what version of the 802.11 was used. The next field is called a duration field. It specifies how long the total frame is. So, the receiver knows how long it should expect to have to listen to the transmission. After this, are four address fields. Let’s take a moment to talk about why there are four instead of the normal two. We’ll discuss different types of wireless network architectures in more detail later in this lesson, but the most common setup includes devices called access points. A wireless access point is a device that bridges the wireless and wired portions of a network. A single wireless network might have lots of different access points to cover a large area. Devices on a wireless network will associate with a certain access point. This is usually the one they’re physically closest to. But, it can also be determined by all sorts of other things like general signal strength, and wireless interference. Associations isn’t just important for the wireless device to talk to a specific access point, it also allows for incoming transmissions to the wireless device to be sent by the right access point. There are four address fields, because there needs to be room to indicate which wireless access point should be processing the frame. So, we’d have our normal source address field, which would represent the MAC address of the sending device. But, we’d also have the intended destination on the network, along with a receiving address and a transmitter add

This video is part of a series where we bring the best videos to you, we have made some modifications to this video.
The creator of this course is Google
As per the Coursera FAQ section of the Google IT Support Professional Certificate:
content in the Google IT Support Professional Certificate is licensed under a Creative Commons Attribution 4.0 International License.

This video is for information purposes only
This is not affiliated with Google
Note: We earn a commission when you click on the link and or buy .

Comments are closed.