Introduction to Wireless and Telecommunication
In this modern era, Wireless and Telecommunication have become an integral part of each other to provide wireless communication to common man that helps people located in any part of the world communicate easily. Wireless communication technology transmits information over the air using electromagnetic waves like IR (Infrared), RF (Radio Frequency), satellite, etc. For example, GPS, Wi-Fi, satellite television, wireless computer parts, wireless phones that include 3G and 4G networks, and Bluetooth. This white paper summarizes the importance of Wireless and Telecommunication, their advantages and disadvantages.
Introduction to Wireless and Telecommunication
Telecommunication these days is mostly wireless. It involves transmission of information without wires, cables or any other electrical conductors within a shorter distance or across the globe. Wireless communications are growing to new heights because of its huge business benefits. Wireless technology offers speed, flexibility, and network efficiency. It has become a powerful tool for tech-savvy generation as it facilitates easy information sharing and boosts productivity. One gets the freedom to roam around freely without worrying about the internet connection and still stay connected.
Advantages of Wireless Communication
- Wireless networks are cheaper to install and maintain.
- Data is transmitted faster and at a high speed.
- Reduced maintenance and installation cost compared to other form of networks.
- Wireless network can be accessed from anywhere, anytime.
- Working professionals these days can access Internet anywhere and anytime without carrying cables or wires. This also permits professionals complete their work from remote locations.
- Medical professionals working in remote areas can be in touch with medical center located elsewhere through wireless communication.
- Through wireless communication, emergency situations get immediate help and support.
Disadvantages of Wireless Communication
Wireless communication has its own disadvantages as its advantages. It leads to security threats and data exploitation if not secured appropriately. An unauthorized person can easily capture wireless signals that spreads through the air and misuse information that is transmitted over the wireless network.
To secure wireless signals like WPA and WPA2, one must use strong security protocols. Alternatively, you can also use wireless intrusion prevention system to secure the wireless network.
|Any wireless network that is not secure is vulnerable to attacks such as:
A few tips from ASM to secure your wireless network:
- Keep your Wireless Network Safe – Implement a set of policies on wireless network and identify the ownership of these policies. Review these policies regularly to ensure security control when new risks are identified.
- Discovery and Vulnerability Assessment – Administrators can use discovery tools to detect rogue access points and unauthorized peer-to-peer connections. Secure your wireless router or access point administration interface with strong passwords.
- Disable SSID (Service Set Identifier) – Turning off SSID makes your network invisible to your neighbors and passers-by. This will hide your network from unauthorized access.
- Secure your network with VPN – VPN provides a secure wireless network environment to an employee to connect in to the corporate private network. In this network, data is encrypted and protected from unauthorized access, attacks such as Eavesdropping and Man-in-the-Middle attacks.
- Use personal firewalls: Wireless adapters create new avenues of attack, so install your personal firewalls. It is a good practice to apply security and application patches to fix certain security vulnerabilities.
- Periodic network reviews: It is a good practice to review your corporate wireless network regularly for any vulnerability. This will help you identify and resolve vulnerabilities before attackers exploit your wireless network.
Types of Wireless and Telecommunication
The different types of wireless and telecommunication technologies include:
- Infrared (IR) wireless communication: This type of communication is mainly used for short and medium-range communication where information between devices or systems are transferred through infrared (IR) radiation, which is an electromagnetic energy that has a longer wavelength. You must select a system that must operate as a transmitter (source) and a receiver (destination). Note that there must be no obstruction between the source and the destination. Examples of source and destination include mobile phones, televisions, security systems etc.
- Satellite Communication: In this mode of communication, signal is sent to the satellite, which the satellite amplifies and sends it back to the antenna receiver which is located on the surface of the earth. Satellite communication mainly contains two components: space segment and ground segment. Example: Radio communication.
- Wi-Fi: This mode of communication uses routers to transfer information wirelessly and thereby allows users within the proximity of the router to access the network. These networks must be protected with passwords for security, otherwise intruders can access the network posing threat to sensitive information. Example: Electronic devices like smart phones, laptops, etc use Wi-Fi networks.
- Mobile Communication Systems: In this mode of communication, users use mobile phones to communicate across a single frequency band. Example: Cellular and cordless phones.
- Bluetooth Technology: This mode of communication permits you to connect to various electronic devices wirelessly for data transfer. Example: Cell phones that are connected to hands free earphones, mouse, wireless keyboard
Deploying any type of network securely is always a challenging act and wireless and telecommunication are no different. To protect valuable data against any potential attacks, it is important to plan and follow proper security measures before and after implementing wireless networks in your environment. Most of the security concerns have been addressed by new, stronger features that effectively guard sensitive data and network access.