Terms Associated with Wireless Technology

 Terms Associated with Wireless Technology:

  1. Wireless Access Points:

A wireless access point creates a wireless communication zone which is used to connect from wireless device. Generally they are made using hardware devices. It is the common point in an area where the user can connect and get access to the interest and other facilities running on wireless network.

Wireless access points are known as Wi-Fi-Zones and can be seen easily at organization, companies, buildings, hotels and campuses.



  1. Antennas:

Antennas are generally popular and associated with exchanging of sound wave by using the antennas, sound wave are converted into radio waves which are amplitude and use for broadcasting purposes.

Generally at radio base station, television base station and at other place from where the audio broadcasting is done, antennas are used.

  1. SSID:

SSID Stand for Service Set Identifier which is an alphanumeric unique identifies value which is having length of 32 bit characters. SSID is always case sensitive SSID is present is header of the packets which are sent over a wireless network. When a device tries to connect to the BSS (basic service set), SSID acts as a password.

Due to unique value it differentiates one access point from other. SSID is also referred as the name of network because it is a unique name value which identifies the wireless network.

Security of SSID is comparatively low because it is easy to sniff the packet and get the SSID of the wireless network to monitor, capture and filter the network SSIDs easily.

  1. Bandwidth:

Size of data which can be transmitted over a network in a particular interval of the time is known as bandwidth. Bandwidth is generally measured in bytes or bits per second for the network device. Bandwidth may be of various types.

Some important are:

  1. Network Bandwidth
  2. Data Bandwidth
  3. Frequency bandwidth
  4. Digital bandwidth

Network bandwidth represents the maximum size of the data which can be transmitted over that network. If we talk about web hosting services. Bandwidth is total data transferred to and from the web hosting is a defined interval of time.


  1. GSM:

GSM stand for global system of mobile communication. It is a communication system designed for the mobile telephone by the European Telecommunication Standards Institute. For the GSM network SIM (Subscriber identify model) Card is used Sim is a smart chip size card which contains the identification and phone book of the user GSM is designed to be a secured wireless network based and exploitation.


  1. Hotspot:

Hotspot runs on the wireless technology. It is a control location from where people can connect their device to the internal through the shared connection. It also act as extension to the networks.

Hotspot uses the wireless communication network which is based on WLAN using a router which is connected to the internet service provider. Now many application use hotspot technology for the transferring without any internet connection and wire media. File sharing over the wireless network given an ease to the users. Hotspot can be found in cafeteria, college, hotel, etc.

From the security point of view hotspot are crucially vulnerable to the attack. End to end encryption is best and safest method to use over the hotspot.


  1. Routers:

Router is a special network device which is used to forward the data packet between the computer networks. Router is used to direct the traffic on the internet. Packets are typically forward from one router to other through the network work group which make the internetwork until it reaches to the destination.

Router are generally can be seen in small corporate, schools or a small network that transfer the data packet for the communication like IM, web pages, etc. Dynamic Router Protocol (DRP) is used to exchange the information in the case of multiple routers.


  1. BSSID:

BSSID stands for basic service set identifier. Each access points have its own basic service set  (BSS). BSSID is also known as MAC Address of Access Point. It is a unique combination of hexadecimal numbers. It is the hardware address of the access point which differentiates one from another.


  1. Authentication:

Authentication is the process of verifying the device which attempts to connect with the access points. It identifies the devices which have authority and filters the unauthorized device. Every time authentication is done and after successful authentication connection is established.

Leave a Reply

Your email address will not be published. Required fields are marked *