Networks are all around us, but do we know how they work? In this series, we’ll look at the basics of computer networking, from hardware components to security practices. This is the third post in the series. To read the preceding post, click here.
Wireless Internet will overtake wired Internet in the next five years. This is according to the Cisco® Visual Networking Index™ Global Forecast and Service Adoption for 2013 to 2018—or, in other words, what one of the world’s largest IT companies thinks about the future of the Internet. This includes both cellular Internet (which you get from your mobile phone carrier) and Wi-Fi Internet.
So we’re pretty confident in saying that Wi-Fi is Big Stuff in the world of networking. Sure, it’s not the only wireless networking protocol out there (ahem, Bluetooth, ahem), but it’s the one we know and love. The question is:
How Does Wi-Fi Internet Actually Work?
To understand Wi-Fi, it helps to imagine your home as possessing a very small radio station. After all, Wi-Fi operates on radio waves, the same as TV, radio, and your cordless landline phone, if you still have one.
Here’s what happens:
The Pitfalls of Wi-Fi
Because Wi-Fi is based on radio waves, the signal strength can vary. It’s not unlike listening to your favorite radio station while on a road trip. As you get farther from the tower, the signal gets weaker, breaks up, and eventually fades away. Your Wi-Fi signal does the same. But it’s not only distance that can conquer the signal; walls, doors, floors, and even other wireless devices can interfere with a good Wi-Fi signal.
We’ve already written a post on finding and fixing Wi-Fi dead zones. You can refer to that for ideas on the proper equipment and placement strategies. In a nutshell, if your signal is weak, you can amplify it at the source, repeat it at various points in your home or office, try to connect a second router to your network, or just go ahead and spend some cash on a better, stronger, newer model.
Another potential pitfall of Wi-Fi is that everyone can connect to it. This is especially true if you’re using an open, unsecure connection—which we really hope you’re not. Even if you have a secured connection, an easy-to-guess password means that your network and all the devices attached to it are easy targets for the unscrupulous user.
In an upcoming post, we’ll discuss more practices for network security and password management. Be sure to check in again next week!
Need help with a computer problem? Contact Techspert Services today!
Featured image credit: 123rf.com
These Stories on News
1301 Riverplace Blvd.
Suite 800
Jacksonville, Fl 32207
Call us: 904-204-8292
Local and Cloud Backup
Email Signature Management
Voice over IP
Network Installations
Datto
Emsisoft
Office 365
Advanced Manufacturing | Advanced Marine Preservation | Advantage Construction Equipment |
Ben Dinkins | Brew Hound | Burdette Ketchum |
Dale G. Westling, Sr., P.A. | Darcco Environmental | Florida Coastal School of Law |
Health by Design | IP Convergence Corp | JCA Surety Group |
Merchant Family Agency | Metro Title Group, LLC | Natural Encounters |
Proforma | Smart RX Systems | Team 1 LLC |
Town Center Family | Trusted Hand |
Advanced Manufacturing | Advanced Marine Preservation | Advantage Construction Equipment |
Ben Dinkins | Brew Hound | Burdette Ketchum |
Dale G. Westling, Sr., P.A. | Darcco Environmental | Florida Coastal School of Law |
Health by Design | IP Convergence Corp | JCA Surety Group |
Merchant Family Agency | Metro Title Group, LLC | Natural Encounters |
Proforma | Smart RX Systems | Team 1 LLC |
Town Center Family | Trusted Hand |
We promise we won't spam your inbox with unnecessary emails. Privacy Policy