Unit 14 P3 and M1

Wi-Fi is a mechanism which allows electronic based devices to exchange data such as MP3 files, JPEG and MP4 files it can also connect to various different electronic devices such as mobile phones, laptops, smart phones and tablets by using radio waves. The Wi-Fi protocol is technically know as 802.11 protocol and over time it has advanced giving us 802.11a protocol with a 100 feet range of signal.

 

Bluetooth uses radio waves to exchange data over short distances it can send MP3files JPEG MP4files. Bluetooth’s radio wave use 2.4 GHz and is a secure and inexpensive way to exchange data without using wires and it also mainly used in mobile phones which can detect other peoples bluetooth.

 

3G is 3rd generation of mobile telecommunications the applications of 3G are mobile TV and video on demand and can also connect to modern laptops and other mobile phones most of the typical standards are for Europe, China and Japan. Some of its protocols are: universal mobile telecommunication service (UMTS) Wideband Code – Division Multiple Access (WCDMA) High – Speed Downlink Packet Access (HSDPA) Evolution Data Maximized (EVDO).

 

 Infra red is another mobile communication to exchange data but infra red is very slow and in today’s age not combatable with most wireless devices to exchange data via infra red the devices must be very close together infra red  has a very short distance range but can send over various files such as MP3 files  JPEG MP4 files. 

M1

Encryptions are used to protect a computer againist unathorized access or damage to computers using wireless networks some examples of security protocols are:

Wireless Equivalent Protection (WEP) is one of the least secure forms of security. A network that has been secured with WEP has been found that it can be cracked in 3 minutes by the FBI. It is an old IEEE 802.11 standard from 1999 but was outdated in 2003 by Wi-Fi protected access (WPA) is one of serval popular wireless networking security  it is only a temporary protocol which was replaced with WPA2.

Some wireless networking are protected by passwords on the router and to stop other people hacking their wireless. Bluetooth has a feature that lets you encrypt your connection and control wheater you can be detected by other bluetooth devices and specify the devices to you and wheater or not they need a password to it. Infrared is a secure and simple way to transfer and synchronize data, infrared only works properly if it a short distance so it makes it relatively difficult for the attacker to intercept data that sent over infrared however it does not provide an encryption because the data is sent in plain text so it is vulnerable so precautions are used to ensure that the data is safe. 

Ian Humphries

Ian Humphries


Archive

2013 (4)
Posterous theme by Cory Watilo