Friday, June 24, 2011

What is a Wi-Fi Router and how Wi-Fi works

Wi-Fi is a wireless networking protocol, where in the devices communicate without the use of cables or cords. The name Wi-Fi is often quoted as acronym for wireless fidelity but is derived from the word Hi-Fi( High Fidelity). The latter was the term coined by audiophiles to refer to all kinds of expensive audio equipments that produced the least amount of distortion in sounds.

Wi-Fi works using radio frequency technology. Nowadays most of the devices come with built in Wi-Fi devices like laptop, mobile phones etc. In absence of the built-in device user could use a Wi-Fi adapter.

Depending on the network Wi-Fi could be termed as closed network or an open network. For a closed network, a user requires certain specifications like password and user details to access the network. Area covered under Wi-Fi is termed as wireless hotspot.

How Wi-Fi works?

As previously mentioned Wi-Fi works using radio waves which spreads the Wi-Fi Internet network. These signals are spread via radio waves which are picked up by the Wi-Fi devices. If your laptop or the computer doesn’t have built in Wi-Fi device then you can attach Wi-Fi adapter to your system. Wi-Fi adapter in the computer converts the data into radio signal and then broadcasts it using attached antennae. When the router picks up and decodes it then internet connection is established which can be accessed with your device.

To access the Internet a Wi-Fi device needs to be within the given range which is about 300-600 feet or within the wireless hotspot.

If the any two product are termed as “Wi-Fi certified” then these products can operate with each other and exchange regardless of the fact if they are from different manufacturers.

Wi-Fi operates at frequency of 2.4Ghz and many devices in the market nowadays support it like mobile phone, PDA and laptops,. .

Security Concerns

If not protected, Internet using Wi-Fi can be used in an unauthorized manner. The unauthorized users can exploit Intranet for their own use or for any malicious activity. It is better to implement security procedures like Wired Equivalent Privacy (WEP) and other encryption techniques to prevent such unauthorized use.

No comments:

Post a Comment